0% found this document useful (0 votes)
51 views52 pages

Basic Computer Science

The document provides a series of questions and answers related to basic computer knowledge, covering topics such as computer abbreviations, data units, input/output devices, and types of computers. Key concepts include the smallest unit of data (bit), the function of input units, and the types of printers. It also discusses various components of a CPU and their roles in processing and storing data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views52 pages

Basic Computer Science

The document provides a series of questions and answers related to basic computer knowledge, covering topics such as computer abbreviations, data units, input/output devices, and types of computers. Key concepts include the smallest unit of data (bit), the function of input units, and the types of printers. It also discusses various components of a CPU and their roles in processing and storing data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 52

Basic Computer Knowledge

2. Which of the following is the correct abbreviation of COMPUTER?


a) Commonly Occupied Machines Used in Technical and Educational Research
b) Commonly Operated Machines Used in Technical and Environmental Research
c) Commonly Oriented Machines Used in Technical and Educational Research
d) Commonly Operated Machines Used in Technical and Educational Research
View Answer

Answer: d
Explanation: The word COMPUTER is an abbreviation for the terms “Commonly Operated
Machines Used in Technical and Educational Research”.

9. Which of the following is the smallest unit of data in a computer?


a) Bit
b) KB
c) Nibble
d) Byte
View Answer

Answer: a
Explanation: A bit is defined as the smallest unit of data in a computer system. It is used as a
short form of Binary Digit. A bit can have only two values 0 or 1. A nibble comprises 4 bits, a
byte is a collection of 8 bits whereas KB (Kilobyte) is equal to 1024 bytes.

10. Which of the following unit is responsible for converting the data received from the user
into a computer understandable format?
a) Output Unit
b) Input Unit
c) Memory Unit
d) Arithmetic & Logic Unit
View Answer

Answer: b

Explanation: The Input Unit converts the data, which the user enters into a language that the
computer understands, i.e. it converts the data into binary format. The Output Unit is
responsible for giving the results in a user-understandable format. The Storage Unit is
responsible for storing the data after immediate results of processing whereas; the ALU is
responsible for various arithmetic and bitwise operations.
12. Which of the following is not a type of computer code?
a) EDIC
b) ASCII
c) BCD
d) EBCDIC
View Answer

Answer: a
Explanation: There is no coding scheme like EDIC. EBCDIC stands for Extended Binary Coded
Decimal Interchange Code. BCD stands for Binary Coded Decimal. ASCII stands for American
Standard Code for information interchange.

13. Which of the following part of a processor contains the hardware necessary to perform all
the operations required by a computer?
a) Controller
b) Registers
c) Cache
d) Data path
View Answer

Answer: d
Explanation: A processor is a part of the computer which does all the data manipulation and
decision making. A processor comprises of:
A data path that contains the hardware necessary to perform all the operations. A controller
tells the data path what needs to be done.
The registers act as intermediate storage for the data.

15. Which of the following device use positional notation to represent a decimal number?
a) Pascaline
b) Abacus
c) Computer
d) Calculator
View Answer

Answer: b
Explanation: Abacus was used to do arithmetic calculations around 2500 years ago. Pascaline
was the pascal’s calculator by Blaise Pascal invented for doing laborious calculations.

16. Which of the following is used in EBCDIC?


a) Super Computers
b) Mainframes
c) Machine Codes
d) Programming
View Answer

Answer: b

18. Which of the following defines the assigned ordering among the characters used by the
computer?
a) Accumulation
b) Sorting
c) Collating Sequence
d) Unicode
View Answer

Answer: c

19. Which of the following storage is a system where a robotic arm will connect or disconnect
off-line mass storage media according to the computer operating system demands?
a) Magnetic
b) Secondary
c) Virtual
d) Tertiary
View Answer

Answer: d

Explanation: Tertiary storage is the correct option. It is used in the realms of enterprise storage
and scientific computing on large computer systems and business computer networks and is
something a typical personal computer never sees firsthand.

20. Which of the following is known as the interval between the instant a computer makes a
request for the transfer of data from a disk system to the primary storage and the instance the
operation is completed?
a) Disk utilization time
b) Drive utilization time
c) Disk access time
d) Disk arrival time
View Answer

Answer: d
Explanation: The interval is referred to as the disk arrival time. It depends on several
parameters. Generally, a computer makes a request and the operation is served.

21. Which of the following devices provides the communication between a computer and the
outer world?
a) Compact
b) I/O
c) Drivers
d) Storage
View Answer

Answer: b

22. Which of the following are the input devices that enable direct data entry into a computer
system from source documents?
a) System Access devices
b) Data acquiring devices
c) Data retrieving devices
d) Data Scanning devices
View Answer

Answer: d
Explanation: They are referred to as data scanning devices. They eliminate the need to key in
text data into the computer. It demands the high quality of input documents.

23. Which of the following is the device used for converting maps, pictures, and drawings into
digital form for storage in computers?
a) Image Scanner
b) Digitizer
c) MICR
d) Scanner
View Answer

Answer: b

A digitizer is a device used to convert analog information (like maps, drawings, and pictures)
into digital format so it can be stored and processed by a computer.

24. Which of the following can access the server?


a) Web Client
b) User
c) Web Browser
d) Web Server
View Answer

Answer: a
Explanation: Any computer that has access to the webserver is called the web client. A web
server is any computer that uses the HTTP protocol.
26. Which of the following package allows individuals to use personal computers for storing and
retrieving their personal information?
a) Personal assistance package
b) Graphics package
c) Spreadsheet package
d) Animation package
View Answer

Answer: a

27. Which of the following is created when a user opens an account in the computer system?
a) SFD
b) MFD
c) Subdirectory
d) RFD
View Answer

Answer: c

Explanation of Options:

 a) SFD (System File Directory) – This is not commonly associated with user account
creation; it's more related to system-level file structures.

 b) MFD (Master File Directory) – This is the top-level directory in some older operating
systems that holds information about all files and directories, not directly related to user
account creation.

 c) Subdirectory – When a user opens or creates an account, a personal directory (or


subdirectory) is often created under the main directory to store that user's files and
settings.

 d) RFD (Relative File Descriptor) – This is not a directory but rather refers to descriptors
for files, mainly used internally by systems.

28. Which of the following is a technique that marked the beginning of computer
communications?
a) User Environment
b) Batch Environment
c) Time Sharing
d) Message passing
View Answer
Answer: c
Explanation: The answer is time-sharing. In time-sharing, Users were able to interact with the
computer and could share its information processing resources.

29. Which of the following is a type of technique in which dumb terminals are connected to a
central computer system?
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer

Answer: a

 Time Sharing is a technique where multiple users share a single central computer system
simultaneously.

 Each user interacts through a dumb terminal (a terminal with no processing power; only
input/output capability).

 The central system uses time slices to serve each user in a round-robin manner, making it
seem like they have their own dedicated machine.

30. Which of the following service allows a user to log in to another computer somewhere on
the Internet?
a) e-mail
b) UseNet
c) Telnet
d) FTP
View Answer

Answer: c

31. Which of the following is not a type of computer on the basis of operation?
a) Digital
b) Analog
c) Hybrid
d) Remote
View Answer

Answer: d
Explanation: There are three types of computers basically on the basis of operation:
Analog, Digital, and Hybrid.
32. Which of the following type of computer is mostly used for automatic operations?
a) analog
b) digital
c) hybrid
d) remote
View Answer

Answer: c

Explanation of Options:

 a) Analog – Analog computers process data in a continuous form and are mainly used for
scientific and engineering applications like measuring and simulation, not primarily for
automatic operations.

 b) Digital – Digital computers process discrete data (0s and 1s) and are widely used in
general computing tasks, but they are not specifically known for automatic operations
alone.

 c) Hybrid – Hybrid computers combine the features of both analog and digital
computers. They are widely used in automatic operations such as industrial process
control, scientific simulations, and medical applications (e.g., ICU monitoring systems).

 d) Remote – This is not a type of computer but refers to computing done from a
distance.

35. Which of the following is the first neural network computer?


a) AN
b) AM
c) RFD
d) SNARC (Stochastic Neural Analog Reinforcement Computer)
View Answer

Answer: d
Explanation: SNARC was the first neural network computer. it was built by Minsky and Edmonds
in 1956.

6. The input machine which originated in the United States around 1880s is a ___________
a) Mouse
b) Joystick
c) Keyboard
d) Bar Code Reader
View Answer
Answer: c

Explanation:

 The keyboard as an input device originated from the typewriter, which was invented in
the 1860s–1880s in the United States. Early computer keyboards were based on
typewriter designs, which is why QWERTY layouts are still common.

 a) Mouse – Invented much later (1964) by Douglas Engelbart.

 b) Joystick – First used in aircraft control systems around 1900s, not in 1880s.

 d) Bar Code Reader – Invented in the 1970s for commercial use.

8. 1 yottabyte = ______________
a) 1024 TB
b) 1024 EB
c) 1024 ZB
d) 1024 PB
View Answer

Answer: c
Explanation: 1 yottabyte is equal to 1024 ZB, which stands for zettabyte. Further, 1 ZB=1024 EB
(exabyte) and and 1 EB=1024PB (petabyte).

4. What does SVGA stand for?


a) Standard Visual Graphics Array
b) Super Visual Graphics Array
c) Standard Video Graphics Array
d) Super Video Graphics Array
View Answer

Answer: d

Explanation:

 SVGA stands for Super Video Graphics Array, which is an extension of the older VGA
(Video Graphics Array) standard.

 It was introduced to provide higher resolution (such as 800×600 pixels and above) and
more color depth compared to VGA.
5. The devices that used to give single or multiple colored images and drawings are
____________
a) Monitors
b) Printers
c) Plotters
d) VDUs
View Answer

Answer: c
Explanation: Plotters are the devices which are used to give colored images. They use ink pens
or ink jets for drawing. Pens of different colors and shades are used for shading and styling.

6. A special request originated from some device to the CPU to acquire some of its time is called
___________
a) Disturbance
b) Attenuation
c) Interrupt
d) Noise
View Answer

Answer: c

7. Line Printers that print one line at a time are _________


a) Laser Printers
b) Inkjet Printers
c) Drum Printers and Chain Printers
d) Chain Printers and Inkjet Printers
View Answer

Answer: c

2. Which of the following is NOT an impact printer?

a) Daisy Wheel printer


b) Chain printer
c) Drum printer
d) Laser printer

Answer: d) Laser printer

3. Which of these printers is suitable for printing multi-copy forms (e.g., bills)?

a) Inkjet printer
b) Dot Matrix printer
c) Laser printer
d) Thermal printer

Answer: b) Dot Matrix printer


Explanation: Impact printers like Dot Matrix can print multiple copies using carbon paper, which
non-impact printers cannot.

4. Which of the following is an example of a line impact printer?

a) Inkjet printer
b) Drum printer
c) Laser printer
d) Thermal printer

Answer: b) Drum printer

3. Which of the following is not a bitwise operator?


a) |
b) ^
c) .
d) <<
View Answer

Answer: c

4. The sign magnitude representation of -1 is __________


a) 0001
b) 1110
c) 1000
d) 1001
View Answer

Answer: d

6. The ALU gives the output of the operations and the output is stored in the ________
a) Memory Devices
b) Registers
c) Flags
d) Output Unit
View Answer

Answer: b

Explanation:
 The Arithmetic Logic Unit (ALU) performs arithmetic and logical operations in the CPU.

 After performing the operation, the result is temporarily stored in registers (high-speed
storage areas inside the CPU) before it is moved to memory or sent to an output device.

7. The process of division on memory spaces is called ______________


a) Paging
b) Segmentation
c) Bifurcation
d) Dynamic Division
View Answer

Answer: b

a) Paging – Divides memory into fixed-size blocks called pages

8. Number of bits in ALU is _________


a) 4
b) 8
c) 16
d) 2
View Answer

Answer: c

9. Which flag indicates the number of 1 bit that results from an operation?
a) Zero
b) Parity
c) Auxiliary
d) Carry
View Answer

Answer: b

10. The bitwise complement of 0 is ___________


a) 00000001
b) 10000000
c) 11111111
d) 11111110
View Answer

Answer: c
1. Components that provide internal storage to the CPU are ______
a) Registers
b) Program Counters
c) Controllers
d) Internal chips
View Answer

Answer: a

b) Program Counters – A specific type of register that only stores the address of the next
instruction to be executed; it is not a general internal storage component.

c) Controllers – These control the flow of data and instructions, but they don’t store data.

1. Program Counter (PC)

 Function: Stores the memory address of the next instruction to be executed.

 Role: After fetching an instruction, the PC increments to point to the following


instruction.

2. Instruction Register (IR)

 Function: Holds the current instruction fetched from memory.

 Role: The instruction in IR is decoded and executed by the CPU.

3. Memory Address Register (MAR)

 Function: Stores the address of the memory location from which data needs to be
fetched or to which data needs to be written.

 Role: Works closely with the memory unit during read/write operations.

4. Memory Data Register (MDR) / Memory Buffer Register (MBR)

 Function: Temporarily holds data being transferred to or from the memory.

 Role: Acts as a buffer between the CPU and memory.

5. Accumulator (AC)
 Function: Stores intermediate results of arithmetic and logic operations performed by
the ALU.

 Role: Frequently accessed register for quick operations.

6. Status Register / Flag Register

 Function: Contains flags that indicate the current status of the CPU or results of
operations (e.g., zero flag, carry flag, overflow flag).

 Role: Used for decision-making in programs (e.g., conditional jumps).

7. General Purpose Registers (GPRs)

 Function: Used by the CPU to temporarily store data or intermediate values during
execution.

 Examples: AX, BX, CX, DX in x86 architecture.

8. Stack Pointer (SP)

 Function: Points to the top of the stack in memory.

 Role: Used in function calls, interrupts, and temporary storage of return addresses or
data.

9. Base Register & Index Register

 Function: Used for address calculations and memory addressing in advanced CPU
architectures.

 Role: Useful for implementing arrays and dynamic data structures.

2. Saving data and instructions to make them readily available is the job of __________
a) Storage Unit
b) Cache Unit
c) Input Unit
d) Output Unit
View Answer
Answer: a
Explanation: The storage unit is responsible for storing the data. It makes the instructions
readily available for additional or initial processing whenever required. The cache is a software
component that stores data to serve the data requests in future. It can contain the result of
some earlier computations.

5. Which of the following is non-volatile storage?


a) Backup
b) Secondary
c) Primary
d) Cache
View Answer

Answer: b

8. RAID stands for __________


a) Redundant array of independent disks
b) Redundant array of individual disks
c) Reusable Array of independent disks
d) Reusable array of individual disks
View Answer

Answer: a

9. A non-erasable disk that stores digitized audio information is _____


a) CD
b) CD-ROM
c) DVD-R
d) DVD-RW
View Answer

Answer: b
Explanation: A CD (compact disk) stores digitized audio information whereas DVD is used more
for video than audio. Once data is written on the CD-ROM, it cannot be erased. It is Read-Only
and can be read many times.

0. The first practical form of Random Access Memory was the __________
a) SSEM
b) Cathode Ray Tube
c) William’s Tube
d) Thomas’s Tube
View Answer

Answer: c
a) SSEM (Small-Scale Experimental Machine) – This was the first stored-program computer, but
not a type of memory. It used the Williams Tube for its memory.

b) Cathode Ray Tube – A CRT is the technology on which the Williams Tube was based, but by
itself, it is not RAM.

1. Which of the following was the first commercially used magnetic storage device?

a) Magnetic tape
b) Magnetic drum
c) Floppy disk
d) Hard disk

Answer: b) Magnetic drum

2. Who invented the concept of "virtual memory"?

a) Tom Kilburn
b) Alan Turing
c) John von Neumann
d) Frederick Williams

Answer: a) Tom Kilburn

3. Which of the following is considered the first form of non-volatile memory?

a) Williams Tube
b) ROM
c) Magnetic core memory
d) Dynamic RAM

Answer: c) Magnetic core memory


Explanation: Magnetic core memory, developed in the 1950s, was non-volatile and retained
data even when power was off, unlike early RAM technologies.

5. What was the storage capacity of the first floppy disk introduced by IBM in 1971?

a) 80 KB
b) 160 KB
c) 360 KB
d) 1.2 MB

Answer: a) 80 KB
4. In the instruction ADD A, B, the answer gets stored in ___________
a) B
b) A
c) Buffer
d) C
View Answer

Answer: b
Explanation: In any instruction of the form ADD A, B; the answer gets stored in the A register.
The format is: ADD Destination, Source.

5. What does PC stand for?


a) Program Changer
b) Program Counter
c) Performance Counter
d) Performance Changer
View Answer

Answer: b
Explanation: The Program counter contains the address of the next instruction which is to be
fetched by the control unit.

6. Which of the following holds the last instruction fetched?


a) PC
b) MAR
c) MBR
d) IR
View Answer

Answer: d
Explanation: The IR which stands for the instruction register contains the last instruction
fetched.
All the others options are registers which are used for the fetch operation.

8. Causing the CPU to step through a series of micro operations is called _________
a) Execution
b) Runtime
c) Sequencing
d) Pipelining
View Answer

Answer: c

Explanation:
 Sequencing refers to the process of directing the CPU to execute a series of micro-
operations in the correct order during the execution cycle.

 It is managed by the control unit, which ensures that instructions are carried out step by
step (fetch, decode, execute).

d) Pipelining – Pipelining involves overlapping the execution of instructions to improve


performance but is different from sequencing.

Pipelining is a technique used in modern CPUs to increase instruction throughput by


overlapping the execution phases of multiple instructions.
Instead of completing one instruction before starting the next, the CPU starts working on a new
instruction while previous instructions are still in other stages of execution.

10. What does D in the D-flip flop stand for?


a) Digital
b) Direct
c) Delay
d) Durable
View Answer

Answer: c
Explanation: In the hardwired control unit, the delay element method uses D-flip flop which
causes a delay. Since, in the delay element method, there must be a finite time gap between the
2 steps.

4. What is the primary function of a flip-flop in digital circuits?

a) Perform arithmetic operations


b) Store a single bit of data
c) Convert analog to digital signals
d) Encode data

Answer: b) Store a single bit of data


Explanation: A flip-flop is a bistable circuit that can store one bit (0 or 1) until it is changed by
an input signal.

5. Which flip-flop is commonly used in shift registers?

a) D flip-flop
b) JK flip-flop
c) SR flip-flop
d) T flip-flop
Answer: a) D flip-flop
Explanation: D flip-flops are widely used in shift registers because they pass the input D directly
to output Q at the clock edge, making data shifting easier.

1. Computer has a built-in system clock that emits millions of regularly spaced electric pulses
per _____ called clock cycles.
a) second
b) millisecond
c) microsecond
d) minute
View Answer

Answer: a

3. The operation that does not involves clock cycles is _________


a) Installation of a device
b) Execute
c) Fetch
d) Decode
View Answer

Answer: a
Explanation: Normally, several clock cycles are required to fetch, execute and decode a
particular program.
Installation of a device is done by the system on its own.

6. Which of the following processor has a fixed length of instructions?


a) CISC
b) RISC
c) EPIC
d) Multi-core
View Answer

Answer: b
Explanation: The RISC which stands for Reduced Instruction set computer has a fixed length of
instructions. It has a small instruction set. Also has reduced references to memory to retrieve
operands.

Explanation:
 RISC (Reduced Instruction Set Computer) processors have fixed-length instructions
(typically 32 bits). This simplifies instruction decoding and improves performance
because each instruction is executed in a single clock cycle (or very few cycles).

 CISC (Complex Instruction Set Computer) processors, on the other hand, have variable-
length instructions, making them more complex to decode.

8. The architecture that uses a tighter coupling between the compiler and the processor is
____________
a) EPIC
b) Multi-core
c) RISC
d) CISC
View Answer

Answer: a
Explanation: EPIC stands for Explicitly parallel instruction computing. It has a tighter coupling
between the compiler and the processor. It enables the compiler to extract maximum
parallelism in the original code.

1. CPU has built-in ability to execute a particular set of machine instructions, called as
__________
a) Instruction Set
b) Registers
c) Sequence Set
d) User instructions
View Answer

Answer: a
Explanation: An instruction is any task which is to be performed by the processor. Instructions
are stored in the register. Instruction set is the set of machine instructions.

2. Opcode indicates the operations to be performed.


a) True
b) False
View Answer

Answer: a
Explanation: Every instruction has an opcode. Additionally, it may have one or more operands
and the op code indicates the operation to be performed.
3. The length of a register is called _______
a) word limit
b) word size
c) register limit
d) register size
View Answer

Answer: b

4. The _________ holds the contents of the accessed memory word.


a) MAR
b) MBR
c) PC
d) IR
View Answer

Answer: b
Explanation: The MBR holds the contents of the accessed (read/written) memory word.
MBR stands for Memory Buffer Register.

5. Which of the following is not a visible register?


a) General Purpose Registers
b) Address Register
c) Status Register
d) MAR
View Answer

Answer: d
Explanation: MAR or the memory address register is not a visible register. This register is user
inaccessible. It contains the address of the memory block to be read or written to.

6. Which of the following is a data transfer instruction?


a) STA 16-bit address
b) ADD A, B
c) MUL C, D
d) RET
View Answer

Answer: a
Explanation: The instruction STA 16-bit address is a data transfer instruction.
STA means Store in Accumulator.

. What is correct instruction if you want the control to go to the location 2000h?
a) MOV 2000h
b) MOV A, 2000h
c) JMP 2000h
d) RET 2000h
View Answer

Answer: c
Explanation: The JMP instruction is used to move to a particular location. In 8085
microprocessor, JMP statement tells the processor to go to location 2000h (here).

9. The number of sign bits in a 32-bit IEEE format __________


a) 1
b) 11
c) 9
d) 23
View Answer

Answer: a

5. Size of the ________ memory mainly depends on the size of the address bus.
a) Main
b) Virtual
c) Secondary
d) Cache
View Answer

Answer: a

6. Which of the following is independent of the address bus?


a) Secondary memory
b) Main memory
c) Onboard memory
d) Cache memory
View Answer

Answer: a
Explanation: The secondary memory is independent of the address bus. It increases the storage
space. It is implemented in the form of magnetic storage devices.

9. Which of the following is a type of image scanner?


a) Flat-held
b) Hand-led
c) Flat-bed
d) Compact
View Answer

Answer: c

4. Which of the following is a name of plotter as well as a printer?


a) Flatbed
b) Laser
c) Drum
d) Impact
View Answer

Answer: c

5. Name the device that converts text information into spoken sentences.
a) Speech Sensors
b) Compact convertors
c) Speech Synthesizers
d) Voice systems
View Answer

Answer: c

speech synthesizer is a device or software that converts text information into spoken
sentences using text-to-speech (TTS) technology.

It is commonly used in assistive technologies, navigation systems, and virtual assistants (e.g.,
Siri, Alexa).

8. The process in which a file is partitioned into smaller parts and different parts are stored in
different disks is called _________
a) RAID
b) Mirroring
c) Stripping
d) RAID classification
View Answer

Answer: c

Explanation:
 The correct term is actually "Striping" (not "Stripping"), which is a process where a file
or data is split into smaller blocks (stripes), and these blocks are distributed across
multiple disks in a storage array.

 Striping is used in RAID (Redundant Array of Independent/Inexpensive Disks) to


improve read/write performance by enabling parallel disk operations.

9. Which of the following Printers have a speed in the range of 40-300 characters per second?
a) Inkjet
b) Laser
c) Dot matrix
d) Drum
View Answer

Answer: a

10. Which of the following is a temporary output?


a) Hard copy
b) Soft copy
c) Duplicate copy
d) On paper
View Answer

Answer: b

10. Which of the following is not a process state?


a) Terminated
b) Running
c) Blocked
d) Execution
View Answer

Answer: c
Explanation: There is no blocked state in a process model. The different states are ready,
running, executing, waiting and terminated.

6. Public domain software is usually:


a) System supported
b) Source supported
c) Community supported
d) Programmer supported
View Answer
Answer: c

9. What do you call a specific instruction designed to do a task?


a) Command
b) Process
c) Task
d) Instruction
View Answer

Answer: a

Explanation:

 A command is a specific instruction given to a computer to perform a particular task.

 Commands are commonly used in command-line interfaces (CLI) like Windows


Command Prompt or Linux Terminal.

3. A “glue” between client and server parts of application.


a) Middleware
b) Firmware
c) Package
d) System Software
View Answer

Answer: a
Explanation: A middleware acts as a glue between client and server parts of application. It
provides programming abstraction which means hiding all the relevant details.

. MOM stands for?


a) Message oriented middleware
b) Mails oriented middleware
c) Middleware of messages
d) Main object middleware
View Answer

Answer: a

7. A software that lies between the OS and the applications running on it.
a) Firmware
b) Middleware
c) Utility Software
d) Application Software
View Answer

Answer: b

8. A type of middleware that allows for between the built-in applications and the real-time OS?
a) Firmware
b) Database middleware
c) Portals
d) Embedded Middleware
View Answer

Answer: d

9. What is the other name for object middleware?


a) Object request interface
b) Object enabled interface
c) Object Request broker
d) Object enabled broker
View Answer

Answer: c

10. The _______ calls certain procedures on remote systems and is used to perform
synchronous or asynchronous interactions between systems.
a) Procedure
b) RPC (Remote Procedure Call)
c) Message Oriented
d) DB
View Answer

Answer: b
Explanation: It is called the RPC or the Remote Procedure Call.

1. The word ____________comes from the name of a Persian mathematician Abu Ja’far
Mohammed ibn-i Musa al Khowarizmi.
a) Flowchart
b) Flow
c) Algorithm
d) Syntax
View Answer

Answer: c
3. This characteristic often draws the line between what is feasible and what is impossible.
a) Performance
b) System Evaluation
c) Modularity
d) Reliability
View Answer

Answer: a

4. The time that depends on the input: an already sorted sequence that is easier to sort.
a) Process
b) Evaluation
c) Running
d) Input
View Answer

Answer: c

Explanation:

 Running time (or execution time) of an algorithm depends on the input provided.

 For example, if a sorting algorithm like Insertion Sort receives an already sorted
sequence, its running time will be significantly reduced (O(n) instead of O(n²)) because
fewer operations are needed.

8. A system wherein items are added from one and removed from the other end.
a) Stack
b) Queue
c) Linked List
d) Array
View Answer

Answer: b
Explanation: In a queue, the items are inserted from the rear end and deleted from the front
end.

9. Another name for 1-D arrays.


a) Linear arrays
b) Lists
c) Horizontal array
d) Vertical array
View Answer
Answer: a

Explanation:

 A Queue is a linear data structure where insertion (enqueue) happens at one end (rear)
and deletion (dequeue) happens at the other end (front).

 It follows the FIFO (First In, First Out) principle — the first element added is the first one
removed.

Explanation: Linear arrays are the 1-Dimensional arrays wherein only one row is present and the
items are inserted.

10. A data structure that follows the FIFO principle.


a) Queue
b) LL
c) Stack
d) Union
View Answer

Answer: a

3. This is not a part of the signing on the procedure.


a) Identification
b) Verification
c) Execution
d) Authorization
View Answer

Answer: c
Explanation: Signing on is a part of special system design considerations. It does not involve a
step of execution. It involves identification, verification and authorization.

5. A type of testing that is conducted at the software interface.


a) gray box
b) black box
c) red box
d) white box
View Answer

Answer: b
Explanation: Black box testing is conducted at the software interface. White box testing is
predicted on close examination of procedural details.
7. A software metric that provides a quantitative measure of the logical complexity of a
program.
a) Cyclomatic complexity
b) Index matrix
c) Quantitative complexity
d) System complexity
View Answer

Answer: a

8. An expression for the calculation of cyclomatic complexity.


a) V(G) = E – N + 2
b) V(G) = E + N + 2
c) V(G) = E – N – 2
d) V(G) = E + N – 2
View Answer

Answer: a
Explanation: The option V(G) = E – N + 2 denotes the correct expression. Here, E is the number
of flow graph edges. N is the number of flow graph nodes.

8. A technique that allows more than one program to be ready for execution and provides the
ability to switch from one process to another.
a) multitasking
b) multiprocessing
c) multitasking
d) multiprogramming
View Answer

Answer: d
Explanation: Multiprogramming is the concept implemented for execution and provides the
ability to switch from one task to the other.

3. A single sequential flow of control within a program is ________


a) Process
b) Task
c) Thread
d) Structure
View Answer

Answer: c
Explanation: A thread is a sequential flow of control within a program. Single-threaded program
can handle one task at any time.
4. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network
View Answer

Answer: b

5. Java extension used in threads?


a) java.lang.Thread
b) java.language.Thread
c) java.lang.Threads
d) java.Thread
View Answer

Answer: a

6. A method that must be overridden while extending threads.


a) run()
b) start()
c) stop()
d) paint()
View Answer

Answer: a

A thread in simple words is:

👉 A small unit of a program that runs independently inside a process.

8. A thread becomes non runnable when?


a) Its stop method is invoked
b) Its sleep method is invoked
c) Its finish method is invoked
d) Its init method is invoked
View Answer

Answer: b
Explanation: A thread becomes Not Runnable when one of these events occurs:
• Its sleep method is invoked.
• The thread calls the wait method to wait for a specific condition to be satisfied.
• The thread is blocking on I/O.
A thread in Java has different states:

 Runnable → Ready to run but waiting for CPU.

 Running → Actively executing.

 Non-runnable (Blocked or Waiting) → Temporarily inactive (not eligible for execution).


9. A method used to temporarily release time for other threads.
a) yield()
b) set()
c) release()
d) start()
View Answer
 Answer: a

10. A method used to force one thread to wait for another thread to finish.
a) join()
b) connect()
c) combine()
d) concat()
View Answer
Answer: a

5. In text documents, a structure which stays the same no matter how the
document is represented.
a) Logical
b) Smart
c) Nano
d) Physical
View Answer
Answer: a
Explanation: There are two basic structures- logical and physical. A logical
structure stays the same no matter how the document is represented.

1. In a spreadsheet, letters are used to represent _____________


a) Cells
b) Rows
c) Columns
d) Blocks
View Answer
Answer: c
Explanation: In any spreadsheet, the letters are used to represent columns. The
numbers are used to represent rows.

4. Which of the following isn’t a part of a spreadsheet?


a) row number
b) column number
c) column letter
d) cell address
View Answer
Answer: b

6. ______________ help us to see patterns.


a) Spreadsheets
b) Calculations
c) Charts
d) Graphs
View Answer
Answer: c

9. The placement of information within a cell at the left edge, right edge, or
centered is :
a) Indentation
b) Placement
c) Identification
d) Alignment
View Answer
Answer: d
Explanation: The correct option is Alignment. The left, right and center
positioning is defined by the alignment.

10. A change in the appearance of a value or label in a cell.


a) Alteration
b) Format
c) Indentation
d) Design
View Answer
Answer: b
Explanation: Formatting is the term used whenever there are changes in the
appearance of a value or label.

3. DBMS manages the interaction between __________ and database.


a) Users
b) Clients
c) End Users
d) Stake Holders
View Answer
Answer: c

5. Database is generally __________


a) System-centered
b) User-centered
c) Company-centered
d) Data-centered
View Answer
Answer: b
7. The restrictions placed on the data.
a) Relation
b) Attribute
c) Parameter
d) Constraint
View Answer
Answer: d
Explanation: Constraint is a restriction that is placed on the data.

9. A model developed by Hammer and Mc Leod in 1981.


a) SDM
b) OODBM
c) DDM
d) RDM
View Answer
Answer: a
Explanation: SDM stands for Semantic Data Model.

10. Object=_________+relationships.
a) data
b) attributes
c) entity
d) constraints
View Answer
Answer: c

1. DBMS is a set of __________ to access the data.


a) Codes
b) Programs
c) Information
d) Metadata
View Answer
Answer: b

3. Which of the following isn’t a level of abstraction?


a) physical
b) logical
c) user
d) view
View Answer
Answer: c
Explanation: There are three levels of abstraction: physical, logical and the view
level. These three levels are involved in DBMS.

In DBMS (Database Management System), there are three levels of


abstraction defined by the ANSI/SPARC architecture:
1. Physical level → How the data is actually stored in the database.
2. Logical level → Structure of the data (tables, relationships, constraints).
3. View level → How data is presented to users (different views for different
users).

4. A level that describes how a record is stored.


a) physical
b) logical
c) user
d) view
View Answer
Answer: a

5. The ______level helps application programs hide the details of data types.
a) physical
b) logical
c) user
d) view
View Answer
Answer: d
Explanation: The application programs hide details of datatypes. Views can also
hide information for security purposes.

6. A logical structure of the database.


a) Schema
b) Attribute
c) Parameter
d) Instance
View Answer
Answer: a
Explanation: A schema is the logical structure of the database. e.g A set of
customers and accounts and their relationship
Explanation:
 A schema defines the logical structure of a database, including how
data is organized, the relationships between data, and the constraints
applied.
 For example, in a banking database, the schema defines tables like
Customers, Accounts, and their relationships.
d) Instance – An instance is the actual content of the database at a
particular point in time, not the structure.

7. The actual content in the database at a particular point.


a) Schema
b) Attribute
c) Parameter
d) Instance
View Answer
Answer: d

8. Which of the following is not an object-based logical model?


a) ER
b) Network
c) Semantic
d) Functional
View Answer
Answer: b
Explanation: Network model is a part of record-based logical model and not
object-based. Others are object based models. ER stands for Entity-relationship.

Object-based logical models describe data using entities, attributes, and


relationships. Examples:
 ER (Entity-Relationship) model
 Semantic data model
 Functional model
The Network model is not object-based; it is a record-based logical
model, which organizes data as records connected by links (similar to a graph).

4. A transmission that generally involves dedicated circuits.


a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: a
Explanation: The answer is simplex. Simplex generally involves dedicated
circuits. TV broadcasting is an example.

8. Fire alarms are based on this type of transmission:


a) direct
b) network
c) analog
d) multiple
View Answer
Answer: c
Explanation: Analog transmission is a technique of transmitting voice, data,
image, signal or video information. Fire alarm systems work in the same way.

9. A technique of transmitting data or images or videos (information) using a


continuous signal.
a) direct
b) network
c) analog
d) multiple
View Answer
Answer: c

1. A coaxial cable has a bandwidth of _________ of megahertz.


a) 100
b) 150
c) 1000
d) 10000
View Answer
Answer: a

3. The carrier wave is a _________


a) tan wave
b) cosec wave
c) sine wave
d) cot wave
View Answer
Answer: c
Explanation: The carrier wave is generally a sine wave. Carrier wave is used to
transfer the signal from source to destination.

In analog communication, a carrier wave is a continuous waveform used to


carry information by modulating its properties such as amplitude, frequency,
or phase.
 This carrier is typically a sine wave because it is smooth, periodic, and
mathematically easy to modulate.
 Modulation techniques like AM (Amplitude Modulation), FM
(Frequency Modulation), and PM (Phase Modulation) are based on
altering the sine wave.

4. Controlling the phase is referred as __________


a) modulation
b) half modulation
c) amplitude modulation
d) phase modulation
View Answer

Answer: d
Explanation: It is referred to as phase modulation. When there is a change in
amplitude, it is referred to as amplitude modulation.

Phase means the position of a wave in time.

Amplitude means how tall or strong the wave is.

 It represents the height of the wave from its center line.

 Bigger amplitude → louder sound or stronger signal.

 Smaller amplitude → softer sound or weaker signal.

6. A multiplexing technique based on sampling.


a) FDM
b) TDM
c) SDM
d) FM
View Answer

Answer: b

Explanation:

 TDM (Time Division Multiplexing) is a multiplexing technique where


multiple signals are sampled and transmitted in separate time slots
over the same channel.

 Each signal gets a specific time interval for transmission, and these
intervals repeat cyclically.

 a) FDM (Frequency Division Multiplexing) – Divides the channel by frequency, not


by time sampling.
 c) SDM (Space Division Multiplexing) – Uses separate physical paths for each signal.

7. An example of FDM:
a) broadcast radio
b) telephone
c) machines
d) semi-duplex
View Answer

Answer: a

9. A modulation technique that improves channel bandwidth utilization.


a) direct
b) modulation
c) demodulation
d) multiplexing
View Answer

Answer: d
Explanation: Multiplexing is a modulation technique that improves channel
bandwidth utilization.

1. A topology that is responsible for describing the geometric arrangement of


components that make up the LAN.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer

Answer: b

1. Physical Topology → Describes the actual physical layout of devices,


cables, and other network components in a LAN (e.g., star, bus, ring,
mesh).
2. Logical Topology → Describes how data flows in a network, regardless
of its physical design.

3. _____ LAN topology describes the possible connections between pairs of


networked end-points that can communicate.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer

Answer: c

4. A term that refers to the way in which the nodes of a network are linked
together.
a) network
b) topology
c) connection
d) interconnectivity
View Answer

Answer: b

6. The participating computers in a network are referred to as:


a) Clients
b) Servers
c) Nodes
d) CPUs
View Answer

Answer: c

7. A topology that involves Tokens.


a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer
Answer: b
Explanation: Ring topology involves sending and receiving of data with the help
of tokens. Ring started out as a simple peer-to-peer LAN topology.

8. A ____________WAN can be developed using leased private lines or any other


transmission facility
a) Hybrids
b) peer-to-peer
c) Two-tiered
d) Three-tiered
View Answer

Answer: b
Explanation: A peer-to-peer WAN topology is a relatively simple way of
interconnecting a small number of sites. It has the least-cost solution for WANs
that contain a small number of internetworked locations.

9. A serially connected system of all the hubs of networks.


a) Bus
b) Ring
c) Daisy chains
d) Star
View Answer

Answer: c
Explanation: The correct option is Daisy chain. This simple approach uses ports
on existing hubs for interconnecting the hubs.

10. A piece of information which is sent along with the data to the source
computer.
a) data
b) module
c) token
d) element
View Answer

Answer: c

1. Configuration where many independent computer systems are connected.


a) Complex
b) Distributed
c) Cloud
d) Incremental
View Answer

Answer: b
Explanation: Distributed configuration has many systems connected, and
messages, programs, etc are transmitted between cooperating computer
systems.

3. Components used for interconnecting dissimilar networks that use different


communication protocols.
a) Switches
b) Gateways
c) Routers
d) Bridges
View Answer

Answer: b

They operate at all layers of the OSI model, performing protocol conversion if
needed.

 Switches → Connect devices within the same network (LAN), using the same
protocol.

 Routers → Connect different networks, but they must use the same
protocol (e.g., IP).

 Bridges → Connect two LAN segments using the same protocol (e.g.,
Ethernet to Ethernet).

4. A topology is a modified version of the basic star topology.


a) network
b) two-tiered
c) bus
d) ring
View Answer

Answer: b
Explanation: A two-tiered topology is a modified version of the basic star
topology. Rather than single concentrator routers, two or more routers are used.

 Switches → Work at Data Link Layer (Layer 2).

 Servers → Application Layer, not a networking device.

 Gateways → Can operate at all layers, used for protocol conversion, not
specifically a Layer 3 device.

8. ____________ operate at bottom two layers of the OSI model.


a) Bridges
b) Switches
c) Models
d) Modules
View Answer

Answer: a

9. Connecting two or more networks to form a single network is called :


a) Internetworking
b) Intranetworking
c) Interconnecting
d) Intraconnectivity
View Answer

Answer: a

5. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head
View Answer

Answer: a

7. A section in HTML that contains generic information about the document.


a) body
b) title
c) head
d) style
View Answer

Answer: c
Explanation: The head segment contains a generic info about the document.
The head section must come before the body section in an HTML document.

8. A tag similar to that of the italic tag.


a) <strong>
b) <cite>
c) <code>
d) <i>
View Answer

Answer: b

9. A _________ partitions a web browser window so that multiple web documents


can be displayed simultaneously.
a) Frame
b) set
c) Frameset
d) div
View Answer

Answer: c

10. The _________ attribute specifies the web page to be placed in the frame
initially.
a) name
b) src
c) cols
d) rows
View Answer

Answer: b

7. Any system that uses the HTTP protocol is called _________


a) Web Browser
b) Web Server
c) WWW
d) TCP/IP
View Answer

Answer: b

1. XML stands for?


a) Extensions Made Language
b) Extensible Markup Language
c) Extensible Major Language
d) Extensible Minor Language
View Answer

Answer: b

4. GSM stands for?


a) Global System for Monitoring
b) Graphical System for Mobile Telecommunications
c) Graphical System for Monitoring
d) Global System for Mobile Telecommunications
View Answer

Answer: d

5. IN stands for?
a) Input
b) InterNet
c) Intelligent Network
d) IntraNet
View Answer
Answer: c

7. PDU stands for?


a) Protocol Data Unit
b) Professional Data Unit
c) Protocol Distributed Unit
d) Professional Distributed Unit
View Answer

Answer: a
Explanation: PDU stands for Protocol Data Unit. It is transmitted as a single unit
to other units in a computer network.

1. The web works on this model.


a) Intranet
b) Internet
c) Client-Server
d) Server
View Answer

Answer: c

10. SGML stands for?


a) Standard Granted Markup Language
b) System Generalized Markup Language
c) Standard Generalized Markup Language
d) System Granted Markup Language
View Answer

Answer: c

1. Execution of several activities at the same time.


a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer

Answer: b
Explanation: Execution of several activities at the same time is referred to as
parallel processing. Like, Two multiplications at the same time on 2 different
processes.

Multiprogramming:
Multiple programs are kept in memory and the CPU switches between them
when one is waiting for I/O, maximizing CPU usage.
Keep the CPU busy by running another program when the first one is waiting
for I/O.

✅ Multitasking:
A single CPU quickly switches between tasks, giving the user an illusion of
simultaneous execution for better responsiveness.

Improve user experience by letting multiple tasks appear to run


simultaneously using time slices.

✅ Multiprocessing:
Two or more CPUs (or cores) execute multiple tasks truly in parallel at the same
time for high performance.

3. A term for simultaneous access to a resource, physical or logical.


a) Multiprogramming
b) Multitasking
c) Threads
d) Concurrency
View Answer

Answer: d
Explanation: Concurrency is the term used for the same. When several things are accessed
simultaneously, the job is said to be concurrent.

4. ______________ leads to concurrency.


a) Serialization
b) Parallelism
c) Serial processing
d) Distribution
View Answer

Answer: b

5. A parallelism based on increasing processor word size.


a) Increasing
b) Count based
c) Bit based
d) Bit level
View Answer
Answer: d
Explanation: Bit level parallelism is based on increasing processor word size. It focuses on
hardware capabilities for structuring.

6. A type of parallelism that uses micro architectural techniques.


a) instructional
b) bit level
c) bit based
d) increasing
View Answer

Answer: a

8. The measure of the “effort” needed to maintain efficiency while adding processors.
a) Maintainablity
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer

Answer: c

9. The rate at which the problem size need to be increased to maintain efficiency.
a) Isoeffciency
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer

Answer: a

1. RMI stands for?


a) Remote Mail Invocation
b) Remote Message Invocation
c) Remaining Method Invocation
d) Remote Method Invocation
View Answer

Answer: d
Explanation: The RMI (Remote Method Invocation) is an API that provides a mechanism to
create distributed applications

3. A typical _________ program creates some remote objects, makes references to these
objects accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer

Answer: a

5. The ___________ layer, which provides the interface that client and server application
objects use to interact with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer

Answer: d

6. A layer which is the binary data protocol layer.


a) stub layer
b) skeleton layer
c) remote layer
d) transport protocol
View Answer

Answer: d

5. The process of verifying the identity of a user.


a) Authentication
b) Identification
c) Validation
d) Verification
View Answer

Answer: a

6. A concern of authentication that deals with user rights.


a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification
View Answer

Answer: c
7. CHAP stands for?
a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol
View Answer

Answer: a

 CHAP is an authentication method used in PPP (Point-to-Point Protocol) connections.

 It uses a three-way handshake process to verify the identity of the client without sending the
password in plain text.

1. WTLS stands for?


a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer
View Answer

Answer: a
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the mobile
device and the WAP gateway to internet.

2. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP (Wired Equivalent privacy
c) RSN
d) WP
View Answer

Answer: b
Explanation: WEP stands for Wired Equivalent Privacy

4. A program created by Farmer and Venema for auditing capability.


a) SAAS
b) SATAN
c) SAN
d) SAT
View Answer
Answer: b
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by farmer
and venema.

SATAN stands for Security Administrator Tool for Analyzing Networks.

 Worm → Self-replicating program that spreads over networks without attaching to files.

 Trojan → Malicious program disguised as a useful or legitimate application.

 Bomb (Logic Bomb) → Malicious code triggered by specific conditions (e.g., date/time).

9. An indirect form of surveillance.


a) Honey pot
b) Logical
c) Security
d) Intrusion
View Answer

Answer: a

 A honeypot is a security mechanism that acts as a decoy system to attract attackers.

 It is used as an indirect form of surveillance to monitor, detect, and analyze unauthorized


access attempts without risking the real system.

 Security professionals use honeypots to study attacker behavior and improve defenses.

10. A malicious code hidden inside a seemingly harmless piece of code.


a) Worm
b) Bomb
c) Trojan Horse
d) Virus
View Answer

Answer: c
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program that
appears harmless.

11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer

Answer: d

13. A technique in which a program attacks a network by exploiting IP broadcast addressing


operations.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer

Answer: a
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP
broadcast addressing operations.

 The attacker sends ICMP Echo Request (ping) packets to a network's broadcast address,
spoofing the victim's IP address.

 All devices on the network respond to the ping request, sending replies to the victim.

 This floods the victim with traffic, causing service disruption.

1. A model that is the demo implementation of the system.


a) waterfall
b) prototype
c) incremental
d) agile
View Answer

Answer: b

3. A stage in which individual components are integrated and ensured that they are error-free to
meet customer requirements.
a) Coding
b) Testing
c) Design
d) Implementation
View Answer

Answer: b
5. The customer requirements are broken down into logical modules for ease of
_______________
a) inheritance
b) design
c) editing
d) implementation
View Answer

Answer: d

6. What do you call a technical person who is capable of understanding the basic requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder
View Answer

Answer: b
Explanation: The person is called an analyst. An analyst is a software engineering who is
responsible for requirements gathering.

8. Methodology in which project management processes were step-by step.


a) Incremental
b) Waterfall
c) Spiral
d) Prototyping
View Answer

Answer: b

 The Waterfall Model is a sequential, step-by-step approach to software development and


project management.

 Each phase (Requirement → Design → Implementation → Testing → Deployment →


Maintenance) must be completed before the next begins.

2. Incremental Model

 The project is divided into small parts (increments) and delivered one by one.

 Each increment adds more features until the final system is complete.

 Best for: Projects where features can be delivered in stages.


Example: First version of an app has basic login, later versions add chat, payments, etc.
✅ 3. Spiral Model

 Combines Waterfall and Prototyping, adding a strong focus on risk analysis in each
cycle.

 The development process goes in loops (spirals), improving the product at each
iteration.

 Best for: Large, high-risk projects.


Example: Military or aerospace systems.

✅ 4. Prototyping Model

 A quick, working model (prototype) is built to understand requirements better.

 Then refined into the final system based on user feedback.

 Best for: When user requirements are unclear or may change.


Example: Designing a new mobile app UI first before coding the full app.

1. A ______________ represents the need of information in the program without the


presenting the details.
a) abstraction
b) polymorphism
c) implementation
d) class
View Answer

Answer: a
Explanation: Abstraction is a concept that involves hiding the details and giving only the
necessary information to the user. It increases the power of a programming language.

2. Polymorphism

 Definition: Ability of an object to take many forms; same function name can behave
differently for different objects.

4. Class

 Definition: A blueprint for creating objects in OOP, containing attributes (fields) and
behaviors (methods).
4. This concept allows routines to use data again at different times.
a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer

Answer: b
Explanation: Polymorphism is a concept in OOP wherein different functions can be used
again at different times.

6. A concept that combines data and functions into a single unit called class.
a) inheritance
b) encapsulation
c) polymorphism
d) abstraction
View Answer

Answer: b
Explanation: Encapsulation enables the important concept of data hiding possible. It
combines data and functions into a single unit.

 Encapsulation is an OOP concept that bundles data (variables) and methods (functions)
that operate on that data into a single unit, usually a class.

 It also hides the internal state of an object and only exposes controlled access (using
getters and setters).

9. A procedural programming follows ___________ approach.


a) top-down
b) bottom-up
c) left-right
d) right-left
View Answer

Answer: a
Explanation: A procedural programming follows top-down approach. The main focus is on
the functions. It has a lot of global variable.

 Procedural Programming is a programming paradigm where the focus is on writing


procedures (functions) to perform tasks.

 The program is divided into functions or procedures, and execution happens step by step.

You might also like