0% found this document useful (0 votes)
10 views

Selfstudys Com File (3)

The document outlines the structure and instructions for the Intermediate Examination in Multimedia & Web Technology for 2024, including details on the number of questions, marking scheme, and time allocation. It specifies that the exam consists of two sections: Section-A with 70 objective questions (answer any 35) and Section-B with 20 short answer questions (answer any 10) and 6 long answer questions (answer any 3). Candidates are instructed to follow specific guidelines regarding the answer sheets and the use of electronic devices during the exam.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Selfstudys Com File (3)

The document outlines the structure and instructions for the Intermediate Examination in Multimedia & Web Technology for 2024, including details on the number of questions, marking scheme, and time allocation. It specifies that the exam consists of two sections: Section-A with 70 objective questions (answer any 35) and Section-B with 20 short answer questions (answer any 10) and 6 long answer questions (answer any 3). Candidates are instructed to follow specific guidelines regarding the answer sheets and the use of electronic devices during the exam.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

INTERMEDIATE EXAMINATION – 2024 (ANNUAL)

Multimedia & Web Technology


Sub. Code - 329
Time :- 3 Hours 15 minutes Full Mark - 70
le; % 3 ?kaVs 15 feuV iq.kkZad & 70
I.A., I.Sc. & I.Com. – (OPT)

Total No. of Questions : 70+20+6=96


dqy iz’uksa dh la[;k : 70+20+6=96

Instructions for the candidates :-

1- ijh{kkFkhZ OMR mŸkj iz=d ij viuk iz’u iqfLrdk Øekad ¼10 vadksa dk½ vo’;

fy[ksa A

Candidate must enter his/her Question Booklet Serial no. (10 digits)

in the OMR Answer sheet.

2- ijh{kkFkhZ ;FkklaHko vius ’kCnksa esa gh mŸkj nsa A

Candidates are required to give answer in their own words as far as

practicable.

3- nkfguh vksj gkf’k;sa ij fn;s gq, vad iw.kkZad fufnZ"V djrs gSaA

Figures in the right hand margin indicate full marks.

4- iz'uksa dks /;kuiwoZd i<+us ds fy, ijh{kkfFkZ;ksa dks 15 feuV dk vfrfjDr le;

fn;k x;k gS A

15 minutes of extra time has been allotted for the candidates to read

the questions and follow the instructions carefully.

1
5- ;g iz’u iqfLrdk nks [k.Mksa esa gS] [k.M&v] ,oa [k.M&c A

This Question Paper is divided two section - Section-A & Section-B

6- [k.M&v esa 70 oLrqfu"B iz’u gS] ftuesa ls fdUgha 35 iz’uksa dk mRrj nsuk vfuok;Z

gSA 35 iz’uksa ls vf/kd dk mŸkj nsus ij izFke 35 dk gh ewY;kadu gksxkA izR;sd ds

fy, 1 vad fu/kkZfjr gSA budk mŸkj nsus ds fy, miyC/k djk;s x;s OMR

mŸkj&iz=d esa fn;s x;s lgh fodYi dks uhys@dkys ckWy isu ls izxk<+ djsaA fdlh

Hkh izdkj ls okbZVuj@rjy inkFkZ@ CysM@uk[kwu vkfn OMR mŸkj iz=d esa

iz;ksx djuk euk gS] vU;Fkk ijh{kk ifj.kke vekU; gksxkA

In Section-A, there are 70 objective type questions out of which any

35 questions are to be answered. If more than 35 questions are

answered, then only first 35 will be evaluated. Each carrying 1

marks. Darken the circle with blue/blue ball pen against the correct

option on OMR, Answer sheet provided to you. Do not use whitener/

Liquid/ Blade/ Nail etc. on OMR Answer sheet, otherwise the result

will be invalid.

7- [k.M&c esa 20 y?kq mŸkjh; iz’u gSaA izR;sd ds fy, 2 vad fu/kkZfjr gS] ftuesa ls

fdUgha 10 iz’uksa dk mŸkj nsuk vfuok;Z gSA blds vfrfjDr bl [k.M esa 6 nh?kZ

mŸkjh; iz’u fn;s x;s gS] izR;sd ds fy, 5 vad fu/kkZfjr gS] ftuesa ls fdUgha 3

iz’uksa dk mŸkj nsuk vfuok;Z gSA

In Section-B, there are 20 short answer type questions, each

carrying 2 Marks, out of which any 10 questions are to be answered.

2
Apart from this, there are 6 Long Answer type Questions, each

carrying 5 Marks, out of which any three Questions are to be

answered.

8- fdlh izdkj ds bysDVªkWfud midj.k dk iz;ksx oftZr gS A

Use of any electronic appliances is strictly prohibited.

Section - A (Objective Type Questions)

iz'u la[;k 1 ls 70 rd ds izR;sd iz’u ds pkj fodYi fn, x;s gSa] ftuesa ls ,d

lgh gSaA vius }kjk pqus x;s fodYi dks OMR&’khV ij fpfUgr djsaA fdUgha 35 iz’uksa dk

mÙkj nsA (35 x 1= 35)

Question Nos. 1 to 70 have four options, out of which only one is

correct. You have to mark your selected option, on OMR sheet. Answer

any 35 Questions. (35 x 1= 35)

1- fdlh laca/k esa xq.kksa dh la[;k dks laca/k dk -------------- dgk tkrk gSA

(A) xq.k (B) fj’rk

(C) dk;Z{ks= (D) fMxzh

The number of attributes in a relation is called the …….. of a relation.

(A) Attribute (B) Relation

(C) Domain (B) Degree

2- fdlh laca/k essa iafDr;ksa dh la[;k dks lac/k dk ----------- dgk tkrk gSA

3
(A) izeq[krk (B) fj’rk

(C) dk;Z{ks= (D) fMxzh

The number of rows in a relation is called the ……… of a relation.

(A) Cardinality (B) Relation

(C) Domain (D) Degree

3- MsVkcsl ds dqN mnkgj.k ------------- gSaA

(A) vkbZ ch ,e Mh ch 2 (B) vksjkdy

(C) ekbZ ,lD;w ,y (D) Åij ds lHkh

Some of the example of databases are ……….

(A) IBM DB2 (B) Oracle

(C) My SQL (D) All of the above

4- ---------------- ewY;ksa ij izfrca/k gS] tks vko’;drkvksa ds vk/kkj ij MsVkcl esa laxzghr

gksrs gSaA

(A) rjhdk (B) izfrca/k

(C) xq.k (D) buesa ls dksbZ Hkh ugha

………… are restrictions on the values, stored in a database based

on the requirements.

(A) Method (B) Constraints

(C) Properties (B) None of the above

5- laca/kijd ekWMy esa ck/kkvksa ds mnkgj.k D;k gSa \

(A) Mksesu ck/kk (B) eq[; ck/kk

4
(C) bdkbZ v[kaMrk ck/kk (D) Åij dss lHkh

What are examples of Constraints in relational models ?

(A) Domain Constraints (B) Key Constraints

(C) Entity Integrity Constraints (D) All of the above

6- daqth ck/kkvksa ds mnkgj.k D;k gS \

(A) lqij dqath (B) mEehnokj dqath

(C) izkFkfed dqath (D) Åij ds lHkh

What are the examples of Key Constraints ?

(A) Super Key (B) Candidate Key

(C) Primary key (D) All of the above

7- --------------------- ,d laca/k esa fo’ks"krkvksa dk ,d lsV gS] ftlds fy, laca/k fLFkfr esa

fdlh Hkh nks VQiYl esa ewY;ksa dk leku la;kstu ugha gksrk gSA

(A) lqij dqath (B) mEehnokj dqath

(C) izkFkfed dqath (D) Åij d lHkh

………… is a set of attributes in a relation, for which no two tupples

in a relation state have the same combination of value.

(A) Super Key (B) Candidate Key

(C) Primary key (D) All of the above

8- ------------ dqath rkfydk esa nksgjkok dks cpkus esa enn djrh gSA

(A) lqij dqath (B) mEehnokj dqath

(C) izkFkfed dqath (D) Åij d lHkh

5
……….. Key helps to Protect duplication in the table.

(A) Super Key (B) Candidate Key

(C) Primary key (D) All of the above

9- ----------- ,d Hkk"kk gS ftldk mi;ksx RDBMS esa laxzghr MsVk dks izcaf/kr djus ds

fy, fd;k tkrk gSA

(A) Mh Mh ,y (B) Mh ,e ,y

(C) ,l D;w ,y (D) buesa ls dksbZ Hkh ugha

……. Is a language that is used to manage data stored in a RDBMS.

(A) DDL (B) DML

(C) SQL (D) None of these

10- MsVkcsl flLVe dks daI;wVj ij LFkkfir djus dh vko’drk gksrh gS vkSj bl

daI;wVj dks ----------- ds :Ik esa tkuk tkrk gSA

(A) MsVkcsl loZj (B) MsVkcsl HkaMkj.k

(C) MsVkcsl eseksjh (D) buesa ls dksbZ Hkh ugha

Database system needs to be installed on a computer and this

computer is known as ………..

(A) Database Server (B) Database Storage

(C) Database Memory (D) None of the above

11- ---------- dekaM dk mi;ksx MsVkcsl esa ,d ubZ rkfydk cukus ds fy, fd;k tkrk gSA

(A) vkns’k dk p;u djsa (B) dekaM cuk,a

(C) vkns’k la’kksf/kr djsa (C) vkns’k cnysa

6
………. Command is used to create a new table in the database.

(A) Select Command (B) Create Command

(C) Modify Command (D) Alter Command

12- izksVksdkWy ------------------- ij 'kklu djus ds fy, fu;eksa dk lsV gSa

(A) lapkj (B) ekud

(C) egkuxjh; lapkj (D) ok;jysl lapkj

Protocol are, set of rules to govern

(A) Communication (B) Standard

(C) Metropolitan Communication (D) Wireless Communication

13- baVjusV gS ,d \

(A) WANS dk laxzg

(B) usVodZ dk usVodZ

(C) ySu dk laxzg

(D) leku LANS vkSj WANS dk laxzg

Internet is a ?

(A) Collection of WANS

(B) Network of networks

(C) Collection of network

(D) Collection of identical LANS & WANS

14- fuEufyf[kr esa ls fdl OSI ijr ijr ij psdle pkyw ugha gsa \

(A) l= ijr (B) ifjogu ijr

7
(C) usVodZ ijr (D) MsVk fyad ijr

On which one of the following OSI layer checksum is not operable ?

(A) Session Layer (B) Transport Layer

(C) Network Layer (D) Data Link Layer

15- lkbcj lqj{kk D;k gS \

(A) lkbcj lqj{kk eSyos;j ds fo:) lqj{kk iznku djrh gS

(B) lkbcj lqj{kk fdlh flLVe dks lkbcj geyksa ls cpkrh gS

(C) lkbcj lqj{kk lkbcj vkradokfn;ksa ds fo:) lqj{kk iznku djrh gS

(D) mijksDr lHkh

What is Cyber Security ?

(A) Cyber Security provides security against malware

(B) Cyber Security protects a system from cyber attacks

(C) Cyber Security provides security against cyber-terrorists

(D) All of the above

16- daI;wVj lqj{kk ;k lkbcj lqj{kk ds tud dkSu gSa \

(A) jkWcVZ (B) pkYlZ

(C) ckWc FkkWel (D) vxLr dsjjokWDl

Who is the father of Computer Security or Cyber Security ?

(A) Robert (B) Charles

(C) Bob Thomas (D) August kerchoffs

17- lkbcj lqj{kk ds laLFkkid dkSu gSa \

8
(A) foaV lsQZ (B) ckWc FkkWel

(C) ekflZ;u gkWQ (D) fVe cuZl&yh

Who is the founder of Cyber Security ?

(A) Vint Cerf (B) Bob Thomas

(C) Marcian Hoff (D) Tim Berners-bee

18- fuEufyf[kr esa ls fdlesa] ,d O;fDr dk nwljs O;fDr ;k lewg }kjk yxkrkj ihNk

fd;k tkrk gS \

(A) ihNk djuk (B) cnek’kh

(C) fQf’kax (D) igpku dh pksjh

In which of the following, a person is constantly followed/chased by

another person or group of several peoples ?

(A) Stalking (B) Bulling

(C) Pishing (D) Identity theft

19- fuEufyf[kr esa ls fdls daI;wVj dks pqjkus] tklwlh djus] {kfr igqapkus ;k u"V

djus ds iz;kl ds :Ik esa ifjHkkf"kr fd;k x;k gS & flLVe] usVodZ ;k mul tqM+h

tkudkjh \

(A) fØIVksxzkQh (B) fMftVy gSfdax

(C) lkbcj geyk (D) daI;wVj lqj{kk

Which of the following is defined as an attempt to steal, spy, damage

or destroy computer system, network, or their associated

information?

9
(A) Cryptography (B) Digital hacking

(C) Cyber attack (D) Computer Security

20- ekyos;j dk iw.kZ :Ik ------------- gS

(A) cgqmís’kh; lkW¶Vos;j (B) nqHkkZoukiw.kZ lkW¶Vos;j

(C) [kjkc lkW¶Vos;j (D) lqj{kk dh [kjkch

The full form of Malware is …………

(A) Multipurpose software (B) Malicious software

(C) Malfunctioned software (D) Malfunctioned of security

21- lkekU;r% fdrus izeq[k rRo laiw.kZ lqj{kk lajpuk dk fuekZ.k djrs gSa \

(A) 3 (B) 4

(C) 5 (D) 6

In general how many key elements constitute the entire security

structure ?

(A) 3 (B) 4

(C) 5 (D) 6

22- ykbudl ds laLFkkid dkSu Fks \

(A) fyul Vks[kkYM~l (B) vkbZ ch ,e

(C) fØLVksQj ekfdZu (D) fcy xsV~l

Who was the founder of Linux ?

(A) Linux Torvalds (B) IBM

(C) Christopher Markin (D) Bill Gates

10
23- ,l ,l ,p dk Qqy QkWeZ \

(A) loZj flD;ksj gc (B) loZj gc esa lqj{kk

(C) lqjf{kr 'kSy (D) lqjf{kr loZj gc

Full Form of SSH ?

(A) Server Secure Hub (B) Security in Server Hub

(C) Secure Shell (D) Secure Server Hub

24- VsyusV ds ckjs esa fuEufyf[kr esa ls dkSu lk xyr gS \

(A) VsyusV ,d DykbaV&loZj izksxzke gS ftldk mi;ksx vDlj lkekU; rkSj ij

fd;k tkrk gSA

(B) ;g vkidks fjeksV flLVe ij lkW¶Vos;j dk mi;ksx djus dh iksVsZfcfyVh

iznku djrk gSA

(C) bldk mi;ksx Qkbyksa dks LFkkukarfjr djus ds fy, fd;k tk ldrk gSA

(D) VsyusV dk mi;ksx fjeksV flLVe ls ykWx bu djus ds fy;s fd;k tk ldrk

gSA

Which of the below is incorrect about Telnet ?

(A) Telnet is Client-Server Program after used to general

(B) It Provides you the Portability of using software on a remote

system.

(C) It can be used to transfer files.

(D) Telnet can be used for logging in from remote systems.

11
25- fyuDl dks Bhd ls dke djus ds fy, fdl gkMZos;j dh vko’;drk gksrh gS \

uhps fn, x, fodYiksa esa ls pqusa %

(A) gkMZ Mªkbo (B) lh Mh jkse fMLd

(C) tksfLVd (D) gkMZ&,aM izkslslj

Which hardware component is required by a Linux to function

properly. Select from the options below :

(A) Hard drive (B) CD-ROM Drive

(C) Joystick (D) High-End Processors

26- bVSfyd VsDLV dks ifjHkkf"kr djus ds fy, HTML VSx dk mi;ksx fd;k tkrk gS\

(A) <bVSfyd> (B) <em>

(C) <i> (D) <;g>

Which HTML tag is used to define italic text ?

(A) <italic> (B) <em>

(C) <i> (D) <it>

27- tksjnkj VsDLV dks ifjHkkf"kr djus ds fy, fdl HTML VSx dk mi;ksx fd;k

tkrk gSA

(A) <bVSfyd> (B) <em>

(C) <i> (D) <;g>

Which HTML tag is used to define emphasized text ?

(A) <italic> (B) <em>

(C) <i> (D) <it>

12
28- NksVs VsDLV dks ifjHkkf"kr djus ds fy, fdl HTML VSx dk mi;ksx fd;k tkrk

gS \

(A) <lkekU;> (B) <spam>

(C) <NksVk> (D) <NksVk>

Which HTML tag is used to define smaller text ?

(A) <normal> (B) <spam>

(C) <smaller> (D) <small>

29- fpfUgr ;k gkbykbV fd, x, VsDLV dks ifjHkkf"kr djus ds fy, fdl HTML

VSx dk mi;ksx fd;k tkrk gS \

(A) <fpUgu> (B) <gkbykbV>

(C) <e> (D) <gkbykbV fd;k x;k>

Which HTML tag is used to define marked or highlighted text ?

(A) <mark> (B) <highlight>

(C) <m> (D) <highlighted>

30- gVk, x, ikB ds ek/;e ls ,d iafDr dkss ifjHkkf"kr djus ds fy, fdl HTML

VSx dk mi;ksx fd;k tkrk gS \

(A) <gVk,¡> (B) <Msy>

(C) <gVk;k x;k> (D) <ds ek/;e ls>

Which HTML tag is used to define strike a line though deleted text ?

(A) <delete> (B) <del>

(C) <deleted> (D) <through>

13
31- vaMjykbu Mkys x, VsDLV dks ifjHkkf"kr djus ds fy, fdl HTML VSx dk

mi;ksx fd;k tkrk gS \

(A) <vaMjykbu> (B) <ikB&ltkoV>

(C) <;w> (D) <bUl>

Which HTML tag is used to define underline inserted text ?

(A) <underline> (B) <text-decoration>

(C) <u> (D) <ins>

32- HTML ds fy, fuEufyf[kr esas ls dkSu lk lR; gS \

(A) HTML oscist lajpuk dks ifjHkkf"kr djrk gS(

(B) HTML ,d ekud ekdZvi Hkk"kk gS ftldk mi;ksx T;knkrj osc ist cukus

ds fy, fd;k tkrk gS (

(C) HTMLrRoksa ds ,d lewg ls cuk gS tks czkmtj dks lkexzh dks i<+us ds fy,

fd;k tkrk gS (

(D) HTML esa mijksDr lHkh 'kkfey gSA

Which of the following is true for HTML ?

(A) HTML defines the webpage structure ;

(B) HTML is a standard markup language mostly used to generate

web pages;

(C) HTML is made up of a set of elements that instruct the browser

on how to read the content ;

(D) HTML includes all of the above.

14
33- HTML esa DOM ¼MkWD;wesaV vkWCtsDV ekWMy½ D;k gS \

(A) Hkk"kk&fuHkZj vuqiz;ksx izksxzkfeax

(B) ASP.NET vkWCtsDV inkuqØe

(C) ,Ryhds’ku izksxzkfeax baVjQsl

(D) HTML nLrkost vkWCtsDV izfrfuf/krRo vkSj baVjSD’ku dUosa’ku

What is the DOM (Document Object Model) in HTML ?

(A) Language-dependent application Programming

(B) ASP.NET object hierarchy

(C) Application Programming interface

(D) HTML document object representation & interaction convention

34- ASP.NET osc ,fIyds’ku esa dkWfUQxjs’ku lsfVaXl dks ifjHkkf"kr fd;k x;k gS

(A) Procompiled APP.config (B) e’khu-dkWfUQx

(C) osc-dkWfUQx (D) flLVe-dkWfUQx

In ASP.NET web application configuration setting are defined in

(A) Procompiled APP.config (B) machine.config

(C) Web.config (D) System.config

35- ASP.NET oscist es rRoksa dh 'kSfy;ksa dks cnyus ds fy, ykxw fof/k dks dgk

tkrk gS

(A) ekLVj ist (B) pkbYM ist

(C) dSLdsfMax LVkby 'khV (D) ;w Vh ,Q&8

15
The method applied to change the styles of the elements in a

ASP.NET webpage is called.

(A) Master page (B) Child page

(C) Cascading style sheets (D) UTF-8

36- fdl izdkj dh LVkby 'khV dk mi;ksx djds ge iwjh osclkbV esa fdlh rRo dh

'kSyh cny ldrs gSa \

(A) vkarfjd LVkby’khV (B) ckgjh LVkby’khV

(C) buykbu LVkby’khV (D) mijksDr buesa ls dksbZ ugha

Using which type of style sheet we can change the style of an

element in the entire website ?

(A) Internet Style sheet (B) External Style sheet

(C) Inline Style sheet (D) None of these above

37- fuEufyf[kr esa ls dkSu lk osc loZj fu;a=.k fLFkj ikB iznf’kZr djrk gS tks

juVkbe ij cny ldrk gS \

(A) gkbijfyad (B) ikB ckWDl

(C) yscy (D) mijksDr buesa ls dskbZ ugha

Which of the following Web Server control display static text that can

change at runtime ?

(A) Hyperlink (B) Text box

(C) Label (D) None of these above

16
38- ASP.NET oscist ij foKkiu iznf’kZr djus dss fy, fdl osc loZj fu;a=.k dk

mi;ksx tkrk gS \

(A) Nfo (B) besteSi

(C) iSuy (D) Ad Rotater

Which Web Server control is used to display advertisements in

ASP.NET a Webpage ?

(A) Picture (B) Image map

(C) Pannel (D) Ad Rotater

39- fLFkjkad dSls ?kksf"kr fd, tkrs gSa \

(A) fLFkjkad dhoMZ (B) # izhizkslslj dks ifjHkkf"kr djsa

(C) , vkSj ch nksuksa (D) buessa ls dksbZ ugha

How the constants are declared ?

(A) Const Keyword (B) # define preprocessor

(C) both (A) and (B) (D) None of these

40- rkfdZd ekuksa dks n’kkZus ds fy, dkSu lk izdkj lcls mi;qDr gS \

(A) iw.kkZad (B) cwfy;u

(C) pfj= (D) rSjuk

Which type is best suited to represent to logical values ?

(A) integer (B) boolean

(C) Character (D) float

41- fuEufyf[kr esa ls mi;ksxdrkZ&ifjHkkf"kr izdkjksa dks igpkusa \

17
(A) x.kuk (B) d{kk,a

(C) x.kuk vkSj oxZ nksuksa (D) baV

Identify the user-defined types from the following ?

(A) enumeration (B) Classes

(C) both enumeration and classes (D) int

42- okbM dSjsDVj dh dhoMZ gS \

(A) Wchar (B) Char

(C) Mcy (D) Wchar_t

Keyword of wide character is ?

(A) Wchar (B) Char

(C) double (D) Wchar_t

43- gLrk{kfjr yach iw.kkZad fof’k"B Js.kh fdlds cjkcj gS \

(A) gLrk{kfjr y?kq iw.kkZad (B) vgLrk{kfjr y?kq iw.kkZad

(C) yack baV a (D) Mcy

Signed long int typical range equal to ?

(A) Signed Short int (B) Unsigned Short int

(C) Long int (D) double

44- fMQkWYV :i ls] ,ue MsVk izdkj esa igys uke dk eku D;k gS \

(A) 0 (B) 1

(C) 2 (D) 3

By default, the value of the first name in enum data type is ?

18
(A) 0 (B) 1

(C) 2 (D) 3

45- osfj,cy ,d izrhd gS tks izfrfuf/kRo djrk gS

(A) ,d la[;k

(B) ,d fLVªx
a

(C) daI;wVj dh eseksjh esa ,d HkaMkj.k LFkku

(D) dqN ugha

A variable is a symbol that represents

(A) A number

(B) A string

(C) A storage location in the computer’s memory

(D) Nothing

46- MsVk izdkj int 'kkVZ essa jsat ds lHkh iw.kkZad 'kkfey gksrs gSa

(A) ¼&128 ls $128½ (B) ¼&32]768 ls $ 32]767½

(C) ¼&6]536 ls $ 6]536½ (D) buessa ls dksbZ ugha

The data type int short consists of all integer in the range of

(A) (-128 to +128) (B) (-32,768 to +32,767)

(C) (-6,536 to +6,536) (D) None of them

47- ,d osfj;cy esa laxzghr tkudkjh dks dgk tkrk gS

(A) fLVªax (B) 'kkfCnd

(C) ewY; (D) vkWijsVj

19
The information that is stored in a variable is called as

(A) String (B) Literal

(C) Value (D) Operator

48- dkfLVax vkWijsVj ,d MsVk izdkj dks nwljs MsVk izdkj esa ifjofrZr djrs gSaA

(A) lR; (B) vlR;

(C) lR; ;k vlR; gks ldrk gS (D) ugha dg ldrs

Casting operators convert one data type to another.

(A) TRUE (B) FALSE

(C) Can be true of false (D) Can not say

49- fuEufyf[kr esa fdl vkWijsVj ds ikl nk,¡ ls ck,¡ lac)rk gSA

(A) ,sjs lcfLØfIVax (B) QaD’ku dkWy

(C) tksM+s vkSj ?kVko (D) Vkbi djuk

Which operator is having the right to left associativity in the

following?

(A) Array Subsripting (B) Funciton Call

(C) Addition and Substraction (D) Type cast

50- ikWbaVj vkWijsVj * ,d csfj;,vy dk ikWbaVj gSA

(A) gk¡ (B) ugha

(C) gka ;k uk gks ldrk gS (D) ugha dg ldrs

Pointer operator * is Pointer to a variable.

(A) Yes (B) No

20
(C) Can be Yes or No (D) Can not say

51- bl (?:) vkWijsVj dks D;k dgk tkrk gS \

(A) l’krZ (B) laca/kijd

(C) dkfLVax vkWijsVj (D) vu fjys’kuy

What is this (?:) operator called ?

(A) Conditional (B) Relational

(C) Casting operator (D) Un relational

52- Mk;ukfed dkLV vkWijsVj dk D;k mi;ksx gS \

(A) ;g opqZvy csl Dykl dks O;qRiUu Dykl esa ifjofrZr djrk gSA

(B) ;g opZqvy csl vkWCtsDV dks O;qRiUu vkWCtsDV esa ifjofrZr djrk gSA

(C) ;g izkFkfedrk ds vk/kkj ij vkWijsVj dks ifjofrZr dj nsxkA

(D) ;g opqZvy csl vkWCtsDV dks O;qRiUu Dykl esa ifjofrZr djrk gSA

What is the use of dynamic cast operator ?

(A) it converts virtual base class to derived class

(B) it converts the virtual base object to derived objects

(C) it will convert the operator based on precedence

(D) it converts the virtual base object to derived class

53- lnL; QaD’ku dk mi;ksx djds ckbujh vkWijsVjksa dks vksojyksM djrs le;] ----------

rdZ dh vko’;drk gksrh gS \

(A) 2 (B) 1

(C) 0 (D) 3

21
While overloading binary operators using member function, it

requires ……….. argument ?

(A) 2 (B) 1

(C) 0 (D) 3

54- fuEufyf[kr esa ls dkSu lk lgh fodYi gS \

(A) ,Dl ¾ 5] okbZ ¾ 0 (B) ,Dl ¾ 10] okbZ ¾ 5

(C) ladyu =qfV (D) ,Dl ¾ 5] okbZ ¾ 5

Which of the following is correct option ?

(A) X = 5, Y = 0 (B) X = 10, Y = 5

(C) Compile Error (D) X = 5, Y = 5

55- MkWl ds varxZr VZcksa lh esa flush ¼ ½ QaD’ku D;k djsxk \

(A) lHkh /kkjkvksa vkSj fufnZ"V /kkjkvksa dks ¶y’k djrk gSA

(B) dsoy fufnZ"V LVªhe dks ¶y’k djrk gSA

(C) buiqV@vkmViqV cQj dks ¶y’k djrk gSA

(D) Qkby cQj dks ¶y’k djrk gSA

Under Dos in Turbo C, What is the Purpose of flush ( ) function?

(A) Flushes all streams and specified streams

(B) Flushes only specified strem.

(C) Flushes input/output buffer

(D) Flushes file fuffer.

56- MkWl ds varxZr VcksZ lh esa jsUMksekbt ¼ ½ QaD’ku D;k djsxk \

22
(A) ;g ;k/fPNd la[;k ykSVkrk gSA

(B) fufnZ"V lhek esa ,d ;k/fPNd la[;k tujsVj ykSVkrk gSA

(C) le; ds vk/kkj ij ;k/fPNd eku dss lkFk ,d ;k/fPNd la[;k tujsVj

ykSVkrk gSSA

(D) fdlh fn, x, cht eku ds lkFk ,d ;k/fPNd la[;k ykSVk,aA

What will the function randomize ( ) do in Turbo C under DOS ?

(A) Return a random number

(B) Return a random number generator in the specified range.

(C) Return a random number generator with a random value based

on time.

(D) Return a random number with a given seed value.

57- oXkkZdkj dks"Bd ds Hkhrj ekStwn la[;k my-array [5], ds fy, fuEufyf[kr esa ls

lcls vPNs fodYi esa ls ,d pqusaA

(A) mi&fLØIV (B) iksLV&fLØIV

(C) fdlh lj.kh ds rRo (D) buesa ls dksbZ ugha

Choose one of the best option from the following position number

contained withn a square brackets e.g. my-array [5], is referred as

……..?

(A) Sub-Script (B) Post-Script

(C) Elements of an array (D) None of them

58- ,d vk;keh lj.kh dks ges’kk ------ ekuk tkrk gS \

23
(A) ,d tfVy (B) vuqØfed

(C) jSf[kd (D) (C) vkSj (B) nksuksa

One dimensional array is always considered as ………. ?

(A) Complex (B) Sequential

(C) Linear (D) Both C and B

59- tc lkj.kh dkss fLFkj ?kksf"kr fd;k tkrk gS rks mls izkjaHk fd;k tkrk gS

(A) igyk rRo 'kwU; gS

(B) izksxzke [kRe gksus okyk gS

(C) izksxzke dk eseksjh esa yksM fd;k tkrk gSA

(D) buesa ls dksbZ ugha

When array that are declared static are initialized as ?

(A) The first element is Zero

(B) Program is about to end

(C) Program is loaded into the memory

(D) None of them

60- n~fo&vk;keh lkj.kh okys ,d&vk;keh lkj.kh dks dgk tkrk gS

(A) n~fo&vk;keh lj.kh (B) cgq vk;keh lj.kh

(C) ,d vk;keh lj.kh (D) f=&vk;keh lj.kh

One-dimensional array having two-dimensional arrays is called.

(A) Two-demensional array (B) Multi-dimensional array

(C) One-dimensional array (D) Tri-dimensionall array

24
61- fdlh fo’sk"k rRo dh igpku djus ds fy, nks lcfLØIV dh vko’;drk okyh

rkfydkvksa ;k ljf.k;ksa dks dgk tkrk gS \

(A) ,dkf/kdkj lcfLØIVsM lj.kh (B) Mcy lcfLØIVsM lj.kh

(C) nksrjQk lj.kh (D) buesa ls dksbZ ugha

To identify a particular element tables or arrays that require two

subscripts are called.

(A) Multiple subscripted array (B) Double subsripted array

(C) Two way array (D) None of them

62- Nfo Qkby Lo:i

(A) ih ,e Mh (B) th vkbZ ,Q

(C) feMh (D) Mh Vh ih

Images file formats

(A) PMD (B) GIF

(C) MIDI (D) DTP

63- ts ih bZ th

(A) Nfo laihbu (B) Nfo laiknd

(C) vkWfM;ks izk:i (D) ohfM;ks laiknd

JPEG

(A) Image compression (B) Image Editor

(C) Audio format (D) Video editor

64- TIFF

25
(A) Nfo Qkby Lo:i (B) vkWfM;k Qkby Lo:i

(C) ohfM;ks Qkby Lo:i (D) buesa ls dksbZ Hkh ugha

TIFF

(A) Image file formats (B) Audio file format

(C) Video file format (D) None of the above

65- fcVeSi Nfo;k¡ fdlls cuh gksrh gS \

(A) fp= (B) fiDly

(C) js[kk,a vkSj oØ (D) buesa ls dksbZ Hkh ugha

Bitmap images are made of

(A) Picture (B) Pixels

(C) Lines and Curves (D) None of the above

66- ,d Nfo laiknu lkW¶Vos;j gS \

(A) ist esdj (B) ,e ,l oMZ

(C) QksVks’kkWi (D) Åij ds lHkh

Is an image editing software ?

(A) PageMaker (B) MS-Word

(C) PhotoShop (D) All of the above

67- QksVks’kkWi Qkby ,DlVsa’ku gSA

(A) -ih ,l Mh (B) -ih Mh ch

(C) -lh Mh vkj (D) -th vkbZ ,Q

Photoshop file extension is

26
(A) .psd (B) .pdb

(C) .cdr (D) .gif

68- bldk mi;ksx fQYeksa ds vuqØe ds fy, le; fMtkbu djus ds fy, fd;k tkrk

gS \

(A) Vkbeykbu (B) Vkbej

(C) 'ksMW;wyj (D) ;s lHkh

This is used for designing the timing for the sequence of the movies.

(A) Timeline (B) Timer

(C) Scheduler (D) All of these

69- Mªkbax Vwy ckj esa og Vwy ftldk mi;ksx oxZ vkSj vk;kr cukus ds fy, fd;k

tkrk gSA

(A) vk;r (B) vkjs[k.k

(C) vkdkj (D) buesa ls dksbZ ugha

The tool in the drawing tool bar is used to draw square and

rectangles.

(A) Rectangles (B) Drawing

(C) Shapes (D) None of these

70- ;g ¶yS’k esa og fo’ks"krk gS] tks fdlh osclkbV ij thoar lans’k nsus ;k euksjatu

ds fy, lgk;d gSA

(A) laØe.k (B) ,uhes’ku

(C) izHkko (D) xfr

27
It is the feature in flash, that is helpful for making lively message or

for entertainment in a website.

(A) Transition (B) Animation

(C) Effects (D) Motion

Section -B
Short Answer Type Questions

iz’u la[;k 1 ls 20 y?kq mÙkjh; gSaA fdUgha 10 iz’uksa ds mÙkj nsaA izR;sd iz’u ds
fy, 2 vad fu/kkZfjr gSaA (10x2=20)

Question nos. 1 to 20 are Short Answer Type. Answer any 10


questions. Each question carries 2 marks. (10x2=20)

1- MsVkcsl laxfr dss ckjs esa ppkZ djsaA 2

Discuss about Database consistency.

2- MsVk eSfuiqys’ku Hkk"kk ds ckjs esa ppkZ djsaA 2

Discuss about Data Manipulation Language ?

3- Mhch, dkSu gS \ Mhch, dh ftEesnkfj;ka D;k gS \ 2

Who is DBA ? What are the responsibilities of DBA ?

4- osc DykbaV dks ifjHkkf"kr djsaA 2

Define Web Clients.

5- IMAP dk foLrkj fyf[k,A 2

Write the expansion of IMAP

6- ,e,e,l D;k gS \ 2

28
Wha is MMS ?

7- HTML5 D;k gS \ 2

What is HTML5 ?

8- flesafVd HTML D;k gS \ 2

What is semantic HTML ?

9- ,d Nfo ekufp= D;k gS\ 2

What is Image Map ?

10- nks"kjfgr vkSj gkfuiw.kZ ohfM;ks laihM+u dh rqyuk djsa \ 2

Compare lossless and lossy video compressions ?

11- laihM+u D;k gS \ 2

What is compression ?

12- lQkbZ D;k gS \ 2

What is cleaning ?

13- 3&Mh ,fues’ku essa fo’ks"k izHkko rduhd dk mYys[k djsa \ 2

Mention the special effect technology in 3-D animation ?

14- Lo&xfr ls lh[kus dk D;k mi;ksx gS \ 2

What is the use of self-paced learning.

15- HTML esa cSdxzkmam dyj dSls lsV djsa \ 2

How to set Background color in HTML ?

16- HTML<select> rRo ds fy, fMQkWYV eku dSls lsV djsa \ 2

29
How to set default value for an HTML <select> element ?

17- fdlh rkfydk esa <td> ds fy, fuf’pr pkSM+kbZ dSls lsV djsaA 2

How to set fixed width for <td> in a table ?

18- ,d HTML cVu dSls cuk,a tks ,d fyad dh rjg dke djs \ 2

How to creat an HTML button that acts like a link ?

19- HTML5 esa buiqV izdkj MkVk ds fy, IyslgksYVj eku dSls lsV djsa \2

How to set placeholder value for input type data in HTML5 ?

20- Qqy LØhu vkbZÝse dSls lsV djsa \ 2

How to set full screen iframe ?

Long Answer Type Questions

iz’u la[;k 21 ls 26 rd nh?kZ mÙkjh; iz’u gSaA fdUgha 3 iz’uksa ds mÙkj nsaA izR;sd
ds fy, 5 vad fu/kkZfjr gSaA (3x5=15)

Question nos. 21 to 26 are Long Answer Type. Answer any 3


questions. Each question carries 5 marks. (3x5=15)

21- HTML vkSj CSS dk mi;ksx djds xSj&vk;rkdkj gsMj dSls cuk,a \

How to create Non-Recctangular Header using HTML & CSS ?

22- LØkWy djus ;ksX; HTML desaV ckWDl dSls cuk,a \

How to create scrollable HTML Comment Box ?

23- ,l oh th i`"BHkwfe jax dSls lsV djsa \

How to set the SVG background color ?

30
24- HTML oscist dh lajpuk dks ,d mnkgj.k lfgr le>k;saA

Explain the structure of the HTML webpage with an example ?

25- ÝselsV] Ýse VSx dks ifjHkkf"kr djsaA osc ist dks pkj cjkcj Hkkxksa esa ,sls foHkkftr
djsa dh izR;sd Hkkx vyx&vyx osc ist iznf’kZr djsA

Define Frameset, Frame Tag. Divide the web page into four equal parts
each individual part displays different web page.

26- QkWeZ VSx dks ifjHkkf"kr djsaA lHkh izi= fu;a=.kksa dk mi;ksx ,d iathdj.k i`"B

fMtkbu djsaA

Define Form tag. Desing a Registration page by using all Form controls.

31

You might also like