0% found this document useful (0 votes)
84 views11 pages

11cs 1mark

The document is a question paper for XI Standard Computer Science students at Christ the King Boys Matric HR. Sec. School, Kumbakonam. It contains multiple-choice questions covering topics such as input/output devices, memory types, operating systems, and programming concepts. The questions are designed to test students' knowledge and understanding of computer science fundamentals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views11 pages

11cs 1mark

The document is a question paper for XI Standard Computer Science students at Christ the King Boys Matric HR. Sec. School, Kumbakonam. It contains multiple-choice questions covering topics such as input/output devices, memory types, operating systems, and programming concepts. The questions are designed to test students' knowledge and understanding of computer science fundamentals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

www.Padasalai.Net - No.

1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
001COMPUTER SCIENCE CHAPTER 1 – 18
XI STANDARD
BOOK BACK ONE MARK TEST
1. Identify the input device?
a) Printer b) Mouse c) Plotter d) Projector
2. Expansion for ASCII
a) American School Code for Information Interchange
b) American Standard Code for Information Interchange
c) All Standard Code for Information Interchange

www.Padasalai.
d) American Society Code for Information Interchange
3. Name the volatile memory?
a) ROM b) PROM c) RAM d) EPROM
4. How many characters can be handled in Binary Coded Decimal System?

et
a) 64 b) 255 c) 256 d) 128
5. For 11012 what is the Hexadecimal equivalent?
a) F b) E c) D d) B
6. 2^50 is referred as
a) Kilo b) Tera c) Peta d) Zetta
7. What is the 1‘s complement of 00100110?
a) 00100110 b) 11011001 c) 11010001 d) 00101001
8. Which amongst this is not an octal number?
a) 645 b) 234 c) 876 d) 123
9. Which is a basic electronic circuit which operates on one or more signals?
a) Boolean algebra b) Gate c) Fundamental gates d) Derived gates
10. Which gate is called as the logical inverter?
a) AND b) OR c) NOT d) XNOR
11. A + A = ?
a) A b) O c) 1 d) A
12. Which one of the following is the main memory?
a) ROM b) RAM c) Flash drive d) Hard disk
13. How many bytes does 1 Kilo Byte contain?
a) 1000 b) 8 c) 4 d) 1024
14. NOR is a combination of?
a) NOT(OR) b)NOT(AND) c) NOT(NOT) d) NOT(NOR)
15. NAND is called as Gate
a) Fundamental Gate b) Derived Gate c) Logical Gate d) Electronic gate
16. Which of the following is said to be the brain of a computer?
a) Input devices b) Output devices c) Memory device d) Microprocessor
17. Which of the following is not the part of a microprocessor unit?
a) ALU b) Control unit c) Cache memory d) register
18. How many bits constitute a word?
a) 8 b) 16 c) 32 d) determined by the processor used
19. Which generation of computer used IC‘s?
a) First b) Second c) Third d) Fourth

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 1


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
001
20. Which of the following device identifies the location when address is placed in the memory address
register?
a) Locator b) Encoder c) Decoder d) Multiplexer
21. Which of the following is a CISC processor?
a) Intel P6 b) AMD K6 c) Pentium III d) Pentium IV
22. Which refers to the number of bits processed by a computer‘s CPU?
a) Byte b) Nibble c) Word length d) Bit
23. Which is the fastest memory?

www.Padasalai.
a) Hard disk b) Main memory c) Cache memory d) Blue-Ray disc
24. Identify the output device?
a) Keyboard b) Memory c) Monitor d) Mouse
25. How many memory locations are identified by a processor with 8 bits address bus at a time?

et
a) 28 b) 1024 c) 256 d) 8000
26. What is the capacity of 12cm diameter DVD with single sided and single layer?
a) 4.7 GB b) 5.5 GB c) 7.8GB d) 2.2 GB
27. What is the smallest size of data represented in a CD?
a) Blocks b) Sectors c) Pits d) Tracks
28. Output device is used for printing building plan, flex board, etc.
a) Thermal printer b) Plotter c) Dot matrix d) Inkjet printer
29. Display devices are connected to the computer through.
a) USB port b) PS/2 port c) SCSI port d) VGA connector
30. Operating system is a
a) Application Software b) Hardware c) System Software d) Component
31. Identify the usage of Operating Systems
a) Easy interaction between the human and computer b) Controlling input & output Devices
c) Managing use of main memory d) All the above
32. Which of the following is not a function of an Operating System?
a) Process Management b) Memory Management
c) Security management d) Complier Environment
33. Which of the following OS is a commercially licensed Operating system?
a) Windows b) UBUNTU c) FEDORA d) REDHAT
34. Which of the following Operating systems support Mobile Devices?
a) Windows 7 b) Linux c) BOSS d) iOS
35. File Management manages
a) Files b) Folders c) Directory systems d) All the Above
36. When a system restarts which type of booting is used?
a) Warm booting b) Cold booting c) Touch boot d) Real boot.
37. Interactive Operating System provides
a) Graphics User Interface (GUI) b) Data Distribution
c) Security Management d) Real Time Processing
38. An Example for single task operating system is
a) Linux b) Windows c) MS – DOS d) Unix
39. The File Management used by Linux is
a) ext2 b) NTFS c) FAT d) NFTS

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 2


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
001
40. From the options given below, choose the operations managed by the operating system.
a) Memory b) Processor c) I/O devices d) All of the above
41. Which is the default folder for many Windows Applications to save your file?
a) My Document b) My Pictures c) Documents and Settings d) My Computer
42. Under which of the following OS, the option Shift + Delete – permanently deletes a file or folder?
a) Windows 7 b) Windows 8 c) Windows10 d) None of the OS
43. What is the meaning of "Hibernate" in Windows XP/Windows 7?
a) Restart the Computer in safe mode

www.Padasalai.
b) Restart the Computer in hibernate mode
c) Shutdown the Computer terminating all the running applications
d) Shutdown the Computer without closing the running applications
44. The Shortcut Key used to rename a file in Windows?

et
a) F2 b) F4 c) F5 d) F6
45. Which of the following activities is algorithmic in nature?
a) Assemble a bicycle. b) Describe a bicycle.
c) Label the parts of a bicycle. d) Explain how a bicycle works.
46. Which of the following activities is not algorithmic in nature?
a) Multiply two numbers. b) Draw a kolam.
c) Walk in the park. d) Swapping of Two Numbers
47. Omitting details inessential to the task and representing only the essential features of the task is
known as
a) Specification b) Abstraction c) Composition d) Decomposition
48. Stating the input property and the as:-output relation a problem is known
a) Specification b) Statement c) Algorithm d) Definition
49. Ensuring the input-output relation is
a) The responsibility of the algorithm and the right of the user.
b) The responsibility of the user and the right of the algorithm.
c) The responsibility of the algorithm but not the right of the user.
d) The responsibility of both the user and the algorithm.
50. If i = 5 before the assignment i := i-1 after the assignment, the value of i is
a) 5 b) 4 c) 3 d) 2
51. Expand POST
a) Post on self Test b) Power on Software Test c) Power on Self Test d) Power on Self Text
52. If 0 < i before the assignment i := i-1 after the assignment, we can conclude that
a) 0 < i b) 0 ≤ i c) i = 0 d) 0 ≥i
53. Suppose u, v = 10, 5 before the assignment. What are the values of u and v after the sequence of
assignments?
1 u := v
2 v := u
a) u, v = 5 ,5 b) u, v = 5 ,10 c) u, v = 10 ,5 d) u, v = 10 ,10
54. Which of the following properties is true after the assignment (at line3)?
1 -- i+j = 0
2 i, j := i+1, j-1
3 -- ?

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 3


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
a) i+j >0 001 b) i+j < 0 c) i+j =0 d) i = j
55. If C1 is false and C2 is true, the compound statement
1 if C1
2 S1
3 else
4 if C2
5 S2
6 else

www.Padasalai.
7 S3 executes
a) S1 b) S2 c) S3 d) none
56. If C is false just before the loop, the control flows through
1 S1

et
2 while C
3 S2
4 S3
a) S1 ; S3 b) S1 ; S2 ; S3 c)S1 ; S2 ; S2 ; S3 d) S1 ; S2 ; S2 ; S2 ; S3
57. If C is true, S1 is executed in both the flowcharts, but S2 is executed in

a) (1) only b) (2) only c) both (1) and (2) d) neither (1) nor (2)
58. How many times the loop is iterated?
i := 0
while i ≠ 5
i := i + 1
a) 4 b) 5 c) 6 d) 0
59. A loop invariant need not be true
a) At the start of the loop. b) At the start of each iteration
c) At the end of each iteration d) At the start of the algorithm
60. We wish to cover a chessboard with dominoes, the number of black squares and the number of white
squares covered by dominoes, respectively, placing a domino can be modeled by
a) b := b + 2 b) w := w + 2 c) b, w := b+1, w+1 d) b := w
61. If m x a + n x b is an invariant for the assignment a, b : = a + 8, b + 7, the values of m and n are
a) m = 8, n = 7 b) m = 7, n = -8 c) m = 7, n = 8 d) m = 8, n = -7

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 4


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
62. Which of the following is001
not an invariant of the assignment? m, n := m+2, n+3
a) m mod 2 b) n mod 3 c) 3 X m - 2 X n d) 2 X m - 3 X n
63. If Fibonacci number is defined recursively as
{
0n=0
1n=1
F(n — 1) + F(n — 2) otherwise
F (n)= to evaluate F(4), how many times F() is applied?

www.Padasalai.
a) 3 b) 4 c) 8 d) 9
64. Using this recursive definition
{
1 if n = 0

et
a x an -1 otherwise
a n= how many multiplications are needed to calculate a10?
a) 11 b) 10 c) 9 d) 8
65. Who developed C++?
a) Charles Babbage b) Bjarne Stroustrup c) Bill Gates d) Sundar Pichai
66. What was the original name given to C++?
a) CPP b) Advanced C c) C with Classes d) Class with C
67. Who coined C++?
a) Rick Mascitti b) Rick Bjarne c) Bill Gates d) Dennis Ritchie
68. The smallest individual unit in a program is:
a) Program b) Algorithm c) Flowchart d) Tokens
69. Which of the following operator is extraction operator of C++?
a) >> b) << c) <> d) ^^
70. Which of the following statements is not true?
a) Keywords are the reserved words convey specific meaning to the C++ compiler.
b) Reserved words or keywords can be used as an identifier name.
c) An integer constant must have at least one digit without a decimal point.
d) Exponent form of real constants consists of two parts
71. Which of the following is a valid string literal?
a) ‗A‘ b) ‗Welcome‘ c) 1232 d) ―1232‖
72. A program written in high level language is called as
a) Object code b) Source code c) Executable code d) All the above
73. Assume a=5, b=6; what will be result of a&b?
a) 4 b) 5 c) 1 d) 0
74. Which of the following is called as compile time operators?
a) sizeof b) pointer c) virtual d) this
75. How many categories of data types available in C++?
a) 5 b) 4 c) 3 d) 2
76. Which of the following data types is not a fundamental type?
a) signed b) int c) float d) char

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 5


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
77. What will be the result of001
following
statement? char ch= ‗B‘;
cout << (int) ch;
a) B b) b c) 65 d) 66
78. Which of the character is used as suffix to indicate a floating point value?
a) F b) C c) L d) D
79. How many bytes of memory allocates for the following variable declaration if you are using Dev
C++?

www.Padasalai.
short int x;
a) 2 b) 4 c) 6 d) 8
80. What is the output of the following
snippet? char ch = ‗A‘;

et
ch = ch + 1;
cout<<ch;
a) B b) A1 c) F d) 1A
81. Which of the following is not a data type modifier?
a) signed b) int c) long d) short
82. Which of the following operator returns the size of the data type?
a) sizeof( ) b) int ( ) c) long ( ) d) double ( )
83. Which operator to be used to access reference of a variable?
a) $ b) # c) & d) !
84. This can be used as alternate to endl command:
a) \t b) \b c) \0 d) \n
85. What is the alternate name of null statement?
a) No statement b) Empty statement c) Void statement d) Zero statement
86. In C++, the group of statements should enclose within:
a) { } b) [ ] c) ( ) d) < >
87. The set of statements that are executed again and again in iteration is called as:
a) Condition b) Loop c) Statement d) Body of loop
88. The multi way branching statement:
a) if b) if … else c) switch d) for
89. How many types of iteration statements?
a) 2 b) 3 c) 4 d) 5
90. How many times the following loop will execute? for (int i=0; i<10; i++)
a) 0 b) 10 c) 9 d) 11
91. Which of the following is the exit control loop?
a) For b) while c) do…while d) if…else
92. Identify the odd one from the keywords of jump statements:
a) Break b) Switch c) goto d) continue
93. Which of the following is the entry control loop?
a) do-while b) for c) while d) if-else
94. A loop that contains another loop inside its body:
a) Nested loop b) Inner loop c) Inline loop d) Nesting of loop

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 6


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
001
95. Which of the following header file defines the standard I/O predefined functions?
a) stdio.h b) math.h c) string.h d) ctype.h
96. Which function is used to check whether a character is alphanumeric or not.
a) isalpha() b) isdigit() c) isalnum() d) islower()
97. Which function begins the program execution?
a) isalpha() b) isdigit() c) main() d) islower()
98. Which of the following function is with a return value and without any argument?
a) x=display(int, int) b) x=display() c) y=display(float) d) display(int)

www.Padasalai.
99. Which is return data type of the function prototype of add(int, int);?
a) int b) float c) char d) double
100. Which of the following is the scope operator?
a) > b) & c) % d) ::

et
101. Which of the following is the collection of variables of the same type that are referenced by a
common name?
a) int b) float c) Array d) class
102. int age[]={6,90,20,18,2}; How many elements are there in this array?
a) 2 b) 5 c) 6 d) 4
103. cin>>n[3]; To which element does this statement accepts the value?
a) 2 b) 3 c) 4 d) 5
104. By default, the string ends with which character?
a) \0 b) \t c) \n d) \b
105. Structure definition is terminated by
a) : b) } c) ; d) ::
106. What will happen when the structure is declared?
a) It will not allocate any memory b) It will allocate the memory
c) It will be declared and initialized d) It will be only
declared A structure declaration is given below.
struct Time
{
int hours;
int minutes;
int seconds;
}t;
107. Using above declaration which of the following refers to seconds.
a) Time.seconds b) Time::seconds c) Seconds d) t. seconds
108. Which of the following is a properly defined structure?
a) struct {int num;} b) struct sum {int num;} c) struct sum int sum; d)struct sum {int
num;}; A structure declaration is given below.
struct employee
{
int empno;
char ename[10];
}e[5];
109. Using above declaration which of the following statement is correct.

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 7


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
001
a) cout<<e[0].empno<<e[0].ename; b) cout<<e[0].empno<<ename;
c)cout<<e[0]->empno<<e[0]->ename; d) cout<<e.empno<<e.ename;
110. When accessing a structure member, the identifier to the left of the dot operator is the name of
a) Structure Variable b) Structure Tag c) Structure Member d) Structure Function
111. The term is used to describe a programming approach based on classes and objects is
a) OOP b) POP c) ADT d) SOP
112. The paradigm which aims more at procedures is .
a) Object Oriented Programming b) Procedural programming

www.Padasalai.
c) Modular programming d) Structural programming
113. Which of the following is a user defined data type?
a) Class b) Float c) Int d) Object
114. The identifiable entity with some characteristics and behavior is.

et
a) Class b) Object c) Structure d) Member
115. The mechanism by which the data and functions are bound together into a single unit is known as
a) Inheritance b) Encapsulation c) Polymorphism d) Abstraction
116. Insulation of the data from direct access by the program is called as
a) Data hiding b) Encapsulation c) Polymorphism d) Abstraction
117. Which of the following concept encapsulate all the essential properties of the object that are to be
created?
a) Class b) Encapsulation c) Polymorphism d) Abstraction
118. Which of the following is the most important advantage of inheritance?
a) Data hiding b) Code reusability c) Code modification d) Accessibility
119. ―Write once and use it multiple time‖ can be achieved by
a) Redundancy b) Reusability c) Modification d) Composition
120. Which of the following supports the transitive nature of data?
a) Inheritance b) Encapsulation c) Polymorphism d) Abstraction
121. The variables declared inside the class are known as data members and the functions are known as
a) Data functions b) Inline functions c) Member Functions d) attributes
122. Which of the following statements about member functions are true or false?
i) A member function can call another member function directly with using the dot operator.
ii) Member function can access the private data of the class.
a) i-True, ii-True b) i-False, ii-True c) i-True, ii-False d) i-False, ii-False
123. A member function can call another member function directly, without using the dot operator
called as
a) Sub function b) Sub member
c) Nesting of member function d) Sibling of member function
124. The member function defined within the class behave like
a) Inline functions b) Non inline functionc) Outline function d) Data function
125. Which of the following Access Specifier protects data from inadvertent modifications?
a) Private b) Protected c) Public d)
Global class x
{
int y;
public:

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 8


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
x(int z) 001
{
y=z;
}
} x1[4];
int main()
{
x x2[10];

www.Padasalai.
return 0;
}
126. How many objects are created for the above program
a) 10 b) 14 c) 5 d) 2

et
127. State whether the following statements about the constructor are true or false.
iii) Constructors should be declared in the private section.
iv) Constructors are invoked automatically when the objects are created.
a) True, True b) True, False c) False, True d) False, False
128. Which of the following constructor is executed for the following
prototype? add display( add &); // add is a class name
a) Default constructor b) Parameterized constructor
c) Copy constructor d) Non Parameterized constructor
129. Which of the following refers to a function having more than one distinct meaning?
a) Function overloading b) Member overloading
c) Operator overloading d) Operations overloading
130. Which of the following reduces the number of comparisons in a program?
a) Operator overloading b) Operations overloading
c) Function overloading d) Member overloading
void dispchar(char ch=‘$‘,int size=10)
{
for(int i=1;i<=size;i++)
cout<<ch;
}
131. How will you invoke the function dispchar() for the following input?
To print $ for 10 times
a) dispchar(); b) dispchar(ch,size); c) dispchar($,10); d)dispchar(‗$‘,10 times);
132. Which of the following is not true with respect to function overloading?
a) The overloaded functions must differ in their signature.
b) The return type is also considered for overloading a function.
c) The default arguments of overloaded functions are not considered for Overloading.
d) Destructor function cannot be overloaded.
133. Which of the following is invalid prototype for function overloading
a) void fun (intx); b) void fun (int x); c) void fun (double d);
d) void fun (double d); void fun (char ch) ; void fun (int y); void fun (char ch);
void fun (inty);
134. Which of the following is the process of creating new classes from an existing class?
a) Polymorphism b) Inheritance c) Encapsulation d) super class

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE 9


9677066334
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
135. 001
Which of the following derives a class student from the base class school?
a) school: student b) class student : public school
c) student : public school d) class school : public student
136. The type of inheritance that reflects the transitive nature is
a) Single Inheritance b) Multiple Inheritance c) Multilevel Inheritance d) Hybrid Inheritance
137. Which visibility mode should be used when you want the features of the base class to be available
to the derived class but not to the classes that are derived from the derived class?
a) Private b) Public c) Protected d) All of these

www.Padasalai.
138. Inheritance is process of creating new class from
a) Base class b) Abstract c) Derived class d) Function
139. A class is derived from a class which is a derived class itself, and then this is referred to as
a) Multiple Inheritance b) Multilevel Inheritance c) Single Inheritance d) Double Inheritance

et
140. Which one of the following is used to in ATM Machines?
a) Touch Screen b) Speaker c) Monitor d) Printer
141. Which amongst the following is executed in the order of inheritance?
a) Destructor b) Member function c) Constructor d) Object
142. Which of the following is true with respect to inheritance?
a) Private members of base class are inherited to the derived class with private
b) Private members of base class are not inherited to the derived class with private accessibility
c) Public members of base class are inherited but not visible to the derived class
d) Protected members of base class are inherited but not visible to the outside class
143. Based on the following class declaration answer the questions (from9.1 o
9.4) class vehicle
{
int wheels;
public:
void input_data(float,float);
void output_data();
protected:
int passenger;
};
class heavy_vehicle : protected vehicle
{
int diesel_petrol;
protected:
int load;
protected:
int load;
public:
void read_data(float,float)
void write_data();
};
class bus: private heavy_vehicle
{

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE


9677066334 10
Kindly send me your questions and answerkeys to us : [email protected]
www.Padasalai.Net - No.1 Educational Website in Tamilnadu

CHRIST THE KING BOYS MATRIC HR. SEC.


SCHOOL, KUMBAKONAM – 612
charTicket[20]; 001
public:
void fetch_data(char);
void display_data();
};
};
144. Which is the base class of the class heavy_vehicle?
a) bus b) heavy_vehicle c) vehicle d) both (a) and (c)

www.Padasalai.
146. The data member that can be accessed from the function displaydata()
a) passenger b) load c) Ticket d) All of these
147. The member function that can be accessed by an objects of bus Class is
a) input_data() , b) read_data() ,output_data()write_data()

et
c) fetch_data(), display_data() d) All of these
148. The member function that is inherited as public by Class Bus
a) input_data() , b) read_data() , output_data()write_data()
c) fetch_data(), display_data() d) None of these
149. Which of the following deals with procedures, practices and values?
a) Piracy b) Programs c) Virus d) Computer ethics
150. Commercial programs made available to the public illegally are known as
a) Freeware b) Warez c) Free software d) Software
151. Which one of the following are self-repeating and do not require a computer program to attach
themselves?
a) Viruses b) Worms c) Spyware d) Trojans
152. Which one of the following tracks a user visits a website?
a) Spyware b) Cookies c) Worms d) Trojans
153. Which of the following is not a malicious program on computer systems?
a) Worms b) Trojans c) Spyware d) Cookies
154. A computer network security that monitors and controls incoming and outgoing traffic is
a) Cookies b) Virus c) Firewall d) Worms
155. The process of converting cipher text to plain text is called
a) Encryption b) Decryption c) Key d) Proxy server
156. E-commerce means
a) Electronic commerce b) Electronic data exchange
c) Electric data exchange d) Electronic commercialization.
145. First generation computers used
a) Vacuum tubes b) Transistors c) Integrated circuits d) Microprocessors
157. Distributing unwanted e-mail to others is called.
a) Scam b) Spam c) Fraud d) Spoofing
158. Legal recognition for transactions are carried out by
a) Electronic Data Interchange b) Electronic Data Exchange
c) Electronic Data Transfer d) Electrical Data Interchange

CREATED BY P. SUBRAMANIAN M.SC(I.T)., B.ED., PAGE


9677066334 11
Kindly send me your questions and answerkeys to us : [email protected]

You might also like