Tuesday, March 4, 2014

PLUS TWO COMPUTER SCIENCE STUDY MATERIAL

12. COMPUTER ETHICS

1. Which is the set of rules for deter mining moral standards?

(a) Programs (b) Cracking (c) Ethics (d) Crimes

2. Which refers to the protection of hardware?

(a) Data security (b) Physical security (c) Personnel security (d) Personal security

3 Making and using duplicate hardware and software is called

(a) Crime (b) Publicity (c) Piracy (d) Security

4. A self-replication program that can cause damage to data and files stored on the computer is

(a) Antivirus (b) Virus (c) Language (d) Bacteria

5. How many new viruses are found each day?

(a) 57000 (b) 6 (c) 55000 (d) 5700

6. The software runs on an idle computer without the knowledge of the organization is called

(a) Software time (b) Computer time (c) System time 
(d) Hardware time

7. Which of the following laws prevent computer crimes in India?

(a) Crime (b) Illegal (c) Cyber 
(d) Zero

8. The illegal access to the network is called

(a) Cracking (b) Accessibility (c) Security 
(d) Management

9. The illegal access to the computer hardware and software

(a) Browsing (b) Hacking (c) Chatting 
(d) Cracking

10. ''Cracking'' comes

(a) Transcription (b) Website Service (c) Data Security 
(d) Computer Crime

11. Which refers to software setups that permit only authorized access to the system?

(a) Personal security (b) Personnel security (c) Physical security 
(d) Data security

12. Which security refers to protecting data and computer system against dishonesty?

(a) Personnel (b) Physical (c) Data 
(d) Personal

13. How many percent of computer crimes happen within the company?

(a) 80 (b) 90 (c) 60  
(d) 70

14. How many known virus programs are in existence?

(a) 6 (b) 55000 (c) 5700  
(d) 57000

15. Which of the following is not a way of protection?

(a) Physical Security (b) Personal Security (c) Piracy  
(d) Personnel Security

16. Which of the following is the telephone based Shared Centre?

(a) Website Services (b) Call center (c) Medical Transcription (d) e-Governance

17. Computer ethics has its roots in the work of

(a) Norbert Wiener (b) Herman Hollirith (c) Charles Babbage (d) Blaise Pascal

11. IT ENABLED SERVICES

1. IT that helps in improving the quality of service to the users is called

(a) IT Evolution Studies (b) IT Enabled Studies

(c) IT Environment Studies (d) IT Enabled Services

2. ITES stands for

(a) IT Enabled Services (b) IT Evolution Studies

(c) IT Enabled Studies (d) IT Environment Studies

3. Which of the following traditional services are IT Enabled?

(a) Spreadsheet (b) All the other three choices (c) Word Processors (d) Databases

4. Which can be collected for one purpose that may be useful for some other purpose?

(a) Program (b) ITES (c) Computer (d) Data

5. BPO may be expanded as.

(a) Business Process Online (b) Business Publication Outsourcing

(c) Business Process Outsourcing (d) Business Publication Online

6. Which is defined as a telephone based shared service center for specific customer activities?

(a) Data Management (b) Call Centers (c) Medical Transcription (d) Digitization

7. The process of collecting, digitizing, and processing data is called as

(a) Data Management (b) Digitization (c) Call Centers (d) Medical Transcription

8. Which of the following is a permanent, legal document that formally states the result of a medical investigation?

(a) Medical Transcription (b) Digitization (c) Data Management (d) Call Centers

9. How many steps are involved in medical transcription?

(a) 4 (b) 2 (c) 5 (d) 3

10. Which refers to the conversion of non-digital material to digital form?

(a) Medical Transcription (b) Tele-Medicine (c) Call centers (d) Digitization

11. Which increases the employment opportunities?

(a) KPO (b) ITES (c) IT (d) BPO

12. A facility that allows the user to speak into a special device while typing a letter using computer is called

(a) Telephone (b) Cell phone (c) Speaker 
(d) Dictaphone

13. Which is the key for effective and profitable use of IT in organizations?

(a) Data Management (b) Digitization (c) Call Centers 
(d) Medical Transcription

14. Which services comprise punching data from manually filled forms and images?

(a) Tele-Medicine (b) Call Centers (c) Data Processing 
(d) Medical Transcription

15. Which is critical for the success of ITES?

(a) Computer Crime (b) Computer Virus (c) Computer Time 
(d) Computer Ethics

16. Which of the following is not an IT enabled services?

(a) Data management (b) e-Governance (c) Reservation 
(d) Tele-medicine

17. The two important aspects that must be ensured by the ITES provider are

(a) Customer security and needs (b) better look and feel

(c) Data security and customer privacy (d) personal security and customer satisfaction

10. IMPACT OF COMPUTERS ON SOCIETY

1. 85% of computer usage is

(a) Spreadsheet (b) Presentation (c) Word processing (d) Database

2. Which of the following permits banking from the comfort of the home by using Internet facilities?

(a) e-Learning (b) e-Commerce (c) e-Banking (d) e-Shopping

3. CBT stands for

(a) Computer Based Tools (b) Computer Based Techniques

(c) Coded Binary Tools (d) Computer Based Tutorials

4. The technical element used to reach out the benefits of IT to the common man is

(a) Connectivity (b) Affordable computers (c) All the other three choices (d) Software

5. Which enables data storage and management at home?

(a) Emotion Container (b) Memo frame (c) Personal Archives 
(d) Archive unit

6. Which is an easy interaction with other people through touch screen?

(a) Archive unit (b) Bookshelf (c) Memo frame 
(d) Personal creativity tool

7. Which of the following units will prevent people from acquiring bad habits?

(a) Archive unit (b) Personal Archives (c) Memo frame 
(d) Emotion Container

8. We can purchase any product, any brand, and any quantity from anywhere using

(a) e-Shopping (b) e-Learning (c) e-Commerce 
(d) e-Market

9. Which is an advanced data accessing system?

(a) Bookshelf (b) Memo frame (c) Archive unit (d) Personal creativity tool

10. Which of the following enables online educational programs leading to degrees and certifications?

(a) e-Commerce (b) e-Learning (c) e-Education (d) e-Shopping

11. ATM is an example for

(a) e-shopping (b) e-banking (c) digitization (d) transcription

12. Which of the following functions is used as electronic pets in computerized home?

(a) Robot (b) Interactive screen (c) Creative line (d) Projection TV

13. What is useful in computer based education?

(a) Teaching (b) e-shopping (c) CBT (d) Transcription

14. Which is useful in computer-related functions?

(a) e-banking (b) e-shopping (c) e-mail (d) Call centers

15. ATM means

(a) Auto Teller Machine (b) Arithmetic Teller Machine

(c) Automatic Teller Machine (d) Automated Teller Machine

16. How many technical elements are require by a common man reach the benefits of IT?

(a) 4 (b) 3 (c) 6 (d) 5

9. INHERITANCE

1. The process of creating new classes from the existing classes is

(a) Polymorphism (b) Encapsulation (c) Inheritance (d) Data Abstraction

2. Inheritance is a process of creating new classes

(a) Base classes (b) Parent classes (c) Super classes (d) Derived classes

3. The existing class is called as

(a) Sub class (b) Abstract class (c) Derived class (d) Base class

4. The default visibility mode is

(a) static (b) protected (c) private (d) public

5. A derived class inherits from multiple base classes is known as

(a) Multiple inheritance (b) Hybrid inheritance (c) Multilevel inheritance (d) Single inheritance

6. When a derived class inherits only from one base class is known as

(a) Multipath inheritance (b) Multiple inheritance (c) Multilevel inheritance (d) Single inheritance

7. The class from which the new classes are derived is known as

(a) Base (b) Child (c) Derived (d) Sub

8. Which of the following class is a power packed class with additional attributes and methods?

(a) Derived (b) Static (c) Abstract (d) Base

9. Which of the following class inherits all the properties of the base class?

(a) Abstract (b) Super (c) Base (d) Derived

10. Which keyword is used to define a derived class?

(a) base (b) class (c) derived (d) sub

11. Access specifier is also referred to as

(a) Accessibility (b) Visibility mode (c) Acceptability or Accessibility (d) Acceptability

12. The symbol that must be used between derived and base class is

(a) : (b) :: (c) & (d) #

13. Which are not inherited but are executed first when an instance of the derived class is created?

(a) Data Members (b) Member functions (c) Destructors 
(d) Constructors

14 Which form of inheritance is reflected by the transitive nature of inheritance?

(a) Multilevel (b) Multiple (c) Hierarchical  
(d) Single

15. Classes used only for deriving other classes are called as

(a) Super classes (b) Abstract classes (c) Static classes  
 (d) Concrete classes

16. Read the following declarations:

class vehicle
{
int wheels ;
public:
void inputdata(int, int);
void outputdata( );
protected:
int passenger;
};

class heavy_vehicle:protected vehicle
{
int diesel _petrol;
protected:
int load;
public:
void readdata(i nt, int);
void write data() ;
};

class bus:private heavy_vehicle
{
char marks[20];
publ ic:
void fetchdata(char) ;
void displaydata( );
};

Which is the base class of the heavy_vehicle?

(a) vehicle (b) both bus and vehicle (c) heavy_Vehicle 
 (d) bus

17. The data member that can be accessed from the function displaydata() is

(a) load (b) passenger (c) marks (d) all these three choices

18. The member function can be accessed by an object of bus class is ___ ___ ___ ___ .

(a) None of other three choices (b) inputdata, outputdata

(c) readdata, writedata (d) fetchdata, displaydata

19. The most powerful feature of an object oriented programming language is

(a) Encapsulation (b) Class (c) Polymorphism (d) Inheritance

20. Which of the following is a class from which other classes are de rived?

(a) Derived class (b) Base class (c) Function class (d) Super class

21. How the derived class should be indicated?

(a) Class der_name, visibility mode, base class_id 


(b) Class der_name :: visibility mode base class_id

(c) Class der_name : visibility mode base class_id

(d) Class der_name ; visibility mode base class_id

22. Read the following declarations:

class A

int x,y;

protected:
int s,t;

public:
int u, v;
};

class B:public A
{

};

The data members that inherit from Class A to Class B

(a) u, v (b) x, y (c) Both s,t and u, v (d) s, t

23. u, v data members contain which visibility mode in Class B?

(a) Public (b) Private (c) Either Private or Protected (d) Protected

24. s,t data members contain which visibility mode in Class B?

(a) Static (b) Protected (c) Private (d) Public

25. What must be used between derived and visibility modes?

(a) ; (b) :: (c) : (d) !

26. For which class, objects cannot be declared?

(a) Abstract (b) Destructor (c) Void (d) Constructor

8. CONSTRUCTORS AND DE STRUCTORS

1. Which of the following gets executed, when an instance of a class comes into scope?

(a) Overloading (b) Destructor (c) Constructor

2. Which of the following initializes the class object?

(a) friend function (b) member function (c) inline function

3. When a class object goes out of scope, a special function that gets executed is

(a) Destructor (b) Destroy (c) End

4. The constructor and the destruct or have the same name as the

(a) Function (b) Object (c) Variable

5. Which are special functions of classes?


(d) Encapsulation
(d) constructor function
(d) Constructor
(d) Class

(a) Encapsulation (b) Both Constructors and Destructors


(c) Constructors (d) Destructors






6. Which of the following functions return nothing?






(a) Destructor (b) Both Constructors and Destructors






(c) Pointer (d) Constructor
























7. The constructor add( ) is called as


(a) New (b) Non-parameterized (c) Parameterized (d) Copy


8. Which is a function that removes the memory of an object?


(a) Destructor (b) Scope (c) Pointer (d) Constructor


9. The destructor is prefixed with the symbol


(a) ~ (b) & (c) :: (d) ?:


10. Which is executed at the time of program termination?


(a) Polymorphism (b) Class (c) Constructor (d) Destructor


11. Which of the following are not associated with any data type?


(a) Constructor and destructor (b) Functions


(c) Destructors (d) Constructors


12. The memory space is allocated to an object using


(a) Instance (b) Constructor (c) Destructor (d) Overloading


13. The constructor without any parameter is called as


(a) Parameterized constructor (b) Copy constructor


(c) Default constructor (d) Standard constructor


14. The constructor defined by the computers in the absence of user defined constructor


(a) Parameterized (b) Default (c) Destructor (d) Copy


15. The constructor add( add &a ) is called as ----------- constructor.


(a) Parameterized (b) Default (c) Copy (d) Non-parameterized


16. The constructor add( int s1, int s2) is called as ----------- constructor.


(a) Copy (b) Parameterized (c) Non-parameterized (d) Default


17. Which is executed automatically when the control reaches the end of the class scope?


(a) Destructor (b) Constructor (c) Function (d) Overloading


18. When an object is passed by reference to constructor, the constructor that is executed is


(a) Parameterized (b) Non-parameterized (c) Default (d) Copy


19. Which of the following cannot be overloaded?


(a) Constructor (b) Operator (c) Destructor (d) Function


20. How many destructors are present in a class?


(a) any number (b) 2 (c) 3 (d) 1


21. Which of the following cannot have arguments?


(a) Function overloading (b) Operator overloading (c) Constructor (d) Destructor


22 Constructor should be declared under the scope


(a) private (b) pointer (c) public (d) protected


23. Which of the following is not true?






(a) Constructors can have parameters


(c) Constructors cannot be overloaded


24. Read the following C++ snippet:


class simple


{


private :


int x;


public:


simple(int y)


{


x=y;


}


~simple ()


{


}};


What is the name of the constructor?


(a) simple (b) public














(b) Destructors cannot be overloaded


(d) Constructors is executed automatically


































































(c)private (d) ~simple

























25. Read the following C++ snippet:
class simple


{


private :
int x;


public:


simple (int y)
{


x=y;
}


~simple ()
{


}


};


What type of constructor is used in this snippet?


(a) Parameterized (b) Copy (c) Non-parameterized (d) Data hiding


26. Which of the following is true?


(a) A destructor can have arguments (b) Constructor returns int type


(c) Constructor can have arguments (d) A destructor has a return type


27. Which of the following constructors is executed when a member function returns an object?


(a) Complier generated constructor (b) Default constructor


(c) Non-parameterized constructor (d) Copy constructor


28. Read the following snippet:
class simple


{


private :
int x;


public:


simple (int y)
(x=y);


};


void main()
{


simple s(6);
}


How many objects are created?





(a) 7 (b) 1 (c) 0 (d) 6

7. POLYMORPHISM

1. In C++, polymorphism is achieved through

(a) Inheritance (b) Encapsulation (c) Data hiding (d) Overloading

2. In how many ways polymorphism is achieved in C++?

(a) 3 (b) 4 (c) Many (d) 2

3. Which of the following terms means a name having two or more distinct meanings?

(a) Inheritance (b) Overriding (c) Encapsulation (d) Overloading

4. Which refers to a function having more than one distinct meaning?

(a) Overloaded operator (b) Overloaded operand

(c) Overloaded expression (d) Overloaded function

5. The ability of function to process the message in more than one form is called as

(a) Function overloading (b) Data abstraction (c) Operator overloading (d) Data hiding

6. Which strategy is adopted by the compiler when functions are invoked in function over loading?

(a) First Match (b) Matching (c) Match Best (d) Best Match

7. Which adopts best match strategy to invoke function over loading?

(a) Compiler (b) Overloaded function(c) Interpreter (d) Overloaded operator

8. The mechanism of giving special meaning to an operator is called as

(a) Function overloading (b) Operator overloading

(c) Data overloading (d) Variable overloading

9. How many explicit argument(s) are taken by binary operators overloaded through a member function?

(a) 4 (b) 3 (c) 1 (d) 2

10. During integral promotion, a char data type can be converted to

(a) float (b) integer (c) double (d) all the other three choices

11. Which data type can be converted to integer/char/double in integral data promotion?

(a) double (b) float (c) int (d) char

12. Which data type can be converted to char/double /float in integral data promotion?

(a) float (b) double (c) char (d) int

13. Which of overloaded functions are not considered by the C++ compiler as part of the parameter list?

(a) Formal arguments (b) Default arguments (c) Actual arguments 
(d) Dummy parameters

14. Which of the following operators can be over loaded?

(a) Membership (b) Unary (c) sizeof 
(d) Conditional

15. Which of the following is used to declare the operator function?

(a) method( ) (b) function( ) (c) void( ) 
(d) operator( )

16 Which of the following must have atleast one operand of use defined type?

(a) Constructor overloaded   
(b) Operator overloaded

(c) Function overloaded      
(d) Method overloaded

17. Which function is used to concatenate strings?

(a) strcmp( ) (b) strplus( ) 
(c) strcpy( ) (d) strcat( )

18. The sign for membership operator is

(a) ?: (question colon) (b) :: (double colon) 
(c) . (dot) (d) : (colon)

19. Which operator is used to concatenate two objects of the type Strings?

(a) + (b) * (c) & (d) and

20. Which is one of the facets of C++ that supports object oriented programming?

(a) Data hiding (b) Operator overloading (c) Data abstraction (d) Function overloading

21. The prototype of the overloaded member function is
(a) negative operator - () (b) void operator - (negative) (c) void operator - () (d) void operator minus

22. Which of the following statements invokes the over loaded member function?

(a) Negative n1() (b) n2+; (c) -n2; (d) --n2()

23. Which of the following cannot have same return type ?

(a) void fun(int x, int y); void fun(int x, float y); (b) int fun(int x); void fun(float x);

(c) void fun(int x); void fun(int y); (d) void fun(char x); void fun(char x, int y);

24. In operator overloading, the operator functions must be defined as

(a) member function (b) either member function or friend function

(c) None of these three choices (d) friend function

25. Which of the following operators cannot be over loaded?

(a) += (b) ++ (c) + (d) ::

26. While over loading functions, the possible integral promotions are

(a) Both int_char and char_int (b) char_int (c) int_char (d) None of these

27. The functionality of '+' operator can be extended to strings through

(a) operator overloading (b) function overloading (c) class (d) inheritance

28. The over loaded operator must have atleast one operand of

(a) user-defined type (b) derived (c) array (d) built-in type

29. During over loading of which of the following operators, the left hand object must be an object of their relevant class

(a) Unary (b) None of these three choices (c) Binary (d) Ternary

30. The over loaded function definitions are permitted for which of the following data types?

(a) All of these three choices (b) User defined (c) Derived (d) Built in

31. Which of the following is not true related to function over loading?

(a) Do not use the same function name for two unrelated functions

(b) The return type of overloaded functions may be the same data type.

(c) Each overloaded function must differ by the number of its formal parameter.

(d) The default arguments are considered by the C++ compiler as part of the parameter list

32. Integral promotions are purely -------

(a) program oriented (b) compiler oriented (c) data oriented (d) computer oriented

33. The function operator() is declared in which part of the class ?

(a) static (b) private (c) public (d) protected

34. Which of the following statement is false in case of operator overloading?

(a) Only existing operators can be overloaded

(b) Binary operators overloaded through member function take one explicit argument

(c) The overloaded operator must have at least one operand of user defined type

(d) The basic definition of an operator can be replaced