0% found this document useful (0 votes)
36 views9 pages

Computer YouthEducation 2024 01 24

This document provides a sample exam for a computer exam with 100 multiple choice questions across various topics related to computers, programming, and web development. The exam is divided into two sections, with Section A containing questions 1-55 and Section B containing questions 56-100. The questions cover topics such as HTML, CSS, JavaScript, Java, databases, operating systems, software applications, cybersecurity, and more. The exam is for secondary school students in the 12th grade and will last 2 hours.

Uploaded by

mnsdora181
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views9 pages

Computer YouthEducation 2024 01 24

This document provides a sample exam for a computer exam with 100 multiple choice questions across various topics related to computers, programming, and web development. The exam is divided into two sections, with Section A containing questions 1-55 and Section B containing questions 56-100. The questions cover topics such as HTML, CSS, JavaScript, Java, databases, operating systems, software applications, cybersecurity, and more. The exam is for secondary school students in the 12th grade and will last 2 hours.

Uploaded by

mnsdora181
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Subject : Computer Exam Time : 2 HOURS

Standard : 12 (EM) LEO GROUP OF SCHOOL Date : 30/01/2024


(Round -1)
Chapter : ALL Marks : 100

SECTION - A

Choose the correct option from those given below each question. (Each question carries 1 Marks) (Marks - 100)

1. Using which of following a form can be the designed easily?


A. HTML B. WordPad C. XML D. Form Liner
2. Which value should be given to type attribute of input element to create textbox in form?
A. Input B. Text C. textual D. None of these
3. Which option of Form field properties dialog box should be used to show some text before the user actually enters data?
A. Initial Value B. Default Value C. Display Value D. Form Value
4. What is by default background color of form in KompoZer ?
A. Red B. Yellow C. Light Blue D. White
5. Which tag is used to implement various elements of form?
A. <form>...<\form> B. <form>...</form> C. <form>...<\form> D. </form>...</form>

6. Which button is used to send the values of data entered in the form?
A. Send Button B. Enter Button C. Submit Button D. Reset Button
7. Which tag is used to create the elements within the menu?
A. <option>...</option> B. <dropdown>...</dropdown> C. <list>...</list> D. <select>...</select>
8. Which input element is used to enter text in the form?
A. Password B. Text box C. Radio button D. Check box
9. Which of the following has developed JavaScript?
A. Yahoo B. Google C. Wikipedia D. Netscape
10. ...... type of function is alert().
A. User defined B. Built-in C. Simple and easy D. None of these
11. The syntax of CSS consists of special symbols known as ……….
A. regulation B. ruls C. style D. cascade
12. Functions are defined with .......... keyword.
A. function B. main C. void main D. func
13. Which of the following is a scripting language that is simple, lightweight programming language that does not contain advanced
programming functionalities?
A. JavaScript B. HTML C. C D. Java
14. ....... is the name of event handler for the 'submit' event.
A. OnSubmit() B. Submit() C. onsubmit() D. onSubmit()
15. ...... view is selected to see the source code of CSS Stylesheet.
A. Design B. Source C. Split D. Normal
16. What is the use of CSS?
A. To arrange the visual elements B. To specify styles for the visual elements C. To prepare coding of HTML D. To prepare
JavaScript
17. How many types of variables are there in Java ?
A. 2 B. 3 C. 4 D. 5
18. If another variable declared with same name within the scope of another variable then will be there in the output.
A. value assigned first time to the variable is given in the output.
B. value assigned second(last) time to the variable is given in the output.
C. error occurs.
D. program moves to the infinity mode.
19. <p style="margin-left:39.0pt">Match the following pairs.</p> <table border="1" cellpadding="1" cellspacing="1"
style="width:300px"> <tbody> <tr> <td style="text-align: center;"><strong>Data type</strong></td> <td style="text-align:
center;">Storage Space</td> </tr> <tr> <td><strong>(1)</strong>char</td> <td><strong>(i)</strong> 2 byte</td>
</tr> <tr> <td><strong>(2)</strong> boolean</td> <td><strong>(ii)</strong> 4 byt</td> </tr> <tr>
<td><strong>(3)</strong> float</td> <td><strong>(iii) </strong>8 bytee</td> </tr> <tr> <td><strong>(4)</strong>
double</td> <td><strong>(iv) </strong>1 byte</td> </tr> </tbody> </table>
A. (A→i), (2→ iv), (3→ iii), (4 → i) B. (1→ iv), (2→ ii), (3→ iii), (4 → i) C. (1→ ii), (2→ iv), (3→ i), (4 → iii) D. (1→ i), (2→ iv), (3→
ii),(4 → iii)
20. What is the use of break in switch statement?
A. To move from one case to the other.
B. To terminate switch statement
C. To terminate switch statement and move tothe first statement again
D. (B) or (C)
21. Comment in Java program is written with....... sign.
A. download B. between /* and */ C. (A) and (B) both D. between // and //
22. x = 6; a = 12.5; a % x; will give………….. output.
A. 2 B. 1 C. 0.5 D. 0
23. ………………. is not the example of character literal.
A. 'S' B. '#' C. "SAN" D. '3'
24. ………….. indicates the two hexadecimal numbers in character literal.
A. \ddd B. \xdd C. \udddd D. \udd
25. Amaya has now grown into an editor for many based systems.
A. MXL B. LXM C. XML D. All of these
26. The process of publishing a website means to transfer the webpages, images and style sheets related to the site, to a web server
from which they may be accessed by the users. It is known as………….. .
A. surfing B. uploading C. downloading D. none of these
27. .......... command is used to give the links to the categories.
A. Insert→Link B. Format → Link C. Insert→ Hyperlink D. Edit → Hyperlink
28. Where is each website created on webserve
A. In a directory B. As an independent file C. On C drive D. As per user's choi
29. JavaScript can manipulate cookies using the.....
A. cookie property of the document object. B. cookie property of the image object. C. cookie property of the table object. D.
None of these

30. When JavaScript is used in the webpage, the details of production are separated using................
A. , (comma) B. : (colon) C. ; (semi colon) D. # (hash)
31. Publishing the website is known as ..........
A. uploading B. downloading C. surfing D. none of these
32. ………is not the open source IDE for web development.
A. KompoZe B. Aptana Studio C. Amaya D. Notepad
33. In object oriented programming, the characteristics explaining the objects are called…………..
A. data base B. data field C. data property D. data objects
34. ………..represents the class diagram.
A. Group of many classes B. Constraints C. Relationships among classes D. All of these
35. An inheritance model refers to which of the following relationships?
A. 'is-a' relationship B. 'has-a' relationship C. 'a-part-of' relationship D. All of these
36. ...... symbol is for private visibility.
A. - B. + C. # D. –
37. Which of the following is used to define common features of similar objects ?
A. Class B. Object C. Methods D. All of the above
38. When objects of one class are composed of objects of other class is called .......
A. aggregation B. composition C. (A) or (B) D. none of these
39. ...... is the middle section in class diagram.
A. Class Name B. Behavior/Operation/Method C. Attribute/Property D. Any of these
40. When one class is a kind of another class then is………….. used.
A. single inheritance B. multilevel inheritance C. (A) and (B) both D. none of these
41. What is the reason that in the beginning of encoded file there is data telling which digit/ letter represents which word?
A. It is needed to convert the file in compression form
B. It is needed to convert the file in encoded form
C. It is needed to convert the file in its original uncompressed form
D. It is needed to convert the file in graphical form
42. RationalPlan software supports to which later version of Ubuntu ?
A. 10.04 B. 12.04 C. 13.04 D. 14.04
43. In 'R' software, which command is used to find the mean?
A. Mean (list) B. Median(list) C. Mean(list1, list2) D. Median(list1, list2)
44. What process is done by the data compression while encoding the data?
A. Identifying repetition in the data B. Reducing repetition in the data C. Eliminating repetition in the data D. All of these
45. What is done on any the character to enter it in character map?
A. Click B. Double-click C. Right-click D. Drag and drop
46. In VLC media player, is known by which name ?
A. Stop button B. Play button C. Pause button D. Fullscreen button
47. RationalPlan multi project includes all the features of which product?
A. RationalPlan single project B. RationalPlan project Viewer C. (A) and (B) both D. None of these

48. Why do the amount of data to be transferred become an issue, if the files and directories are transferred to a storage file?
A. Due to finite capacity of storage device B. Due to multiple uses C. (A) and (B) both D. None of these
49. ………….is the advantage of mobile commerce.
A. Contact can be done globally B. Reduces the transaction cost C. It takes less time give order to the merchant D. All of these
50. ………… developed the SSL.
A. Microsoft B. IBM C. Netscape D. Bell Laboratories
51. In which of the following cyber threats the main intention of criminal is to gain child's trust, obtain intimate, personal and sexual
information about the child?
A. Cyber Grooming B. Cyber Fraud C. Cyber Bullying D. Cyber Wildness
52. CA stands for………… .
A. Certification Authority B. Communication Authority C. Conversation Authority D. Capture Authority
53. ........ is a financial exchange that takes place online between the buyer and the seller.
A. Electronic payment B. Online payment C. (A) or (B) D. Master payment
54. Credit card companies use…………… to make online transaction secure.
A. secure online transfer B. secure electronic transfer C. secure money transfer D. secure payment transfer
55. ……………. is a specific logo, mark, word, symbol which is used by the company to distinguish a producer or service from that of
other in the market.
A. Steganography B. Copyright C. Trademark D. Domain Name Dispute
56. Size of......... is indicated by first bracket in int marks [ ] [ ] = new int [5] [3] .
A. rows B. column C. cell D. none of these
57. Array are passed to a function argument by…………… .
A. value B. reference C. both value and reference D. none of these
58. Maximum...... dimension can be given to make 2-D array.
A. [8] [8] B. [16] [16] C. [255] [255] D. There is no limit
59. …………… type of list can be stored in 1-D array.
A. Characters B. Numbers C. (A) and (B) both D. (A) or (B)
60. int marks[] = new int [5], then which is true. about this array ?
A. Marks is the name of an array. B. Stores the five integer values. C. Indicates the indexes also. D. All of these
61. What will be the value of marks[3] in int marks [] = {90, 60, 70, 65, 80} ?
A. 70 B. 65 C. 3 D. 80
62. How much size is occupied by marks variable by int marks [][] = new int [5] [3] ?
A. 15 B. 60 C. 5 D. 3
63. int marks [][] = new int [5] [3], the logical view of array elements is a table of……….. .
A. 3 rows and 5 columns B. 15 columns C. 5 rows and 3 columns D. 15 rows
64. In a character stream,......... is the ASCII value of 5.
A. 00110111 B. 00000101 C. 00110101 D. 00000111
65. Method of Console class reads a ......... from the console.
A. One character of text B. One word of text C. One line of text D. One paragraph of text
66. Program reads the data from.......... stream.
A. storage B. process C. input D. output
67. The class working with binary data in ...... package is called byte class or binary class.
A. java.stream B. java.io C. java.class D. java.package
68. ......... writes string 's' to the stream.
A. void close() B. void write(int c) C. void write (string s) D. Any of these

69. boolean isFile() can return........... value.


A. true B. false C. (A) or (B) D. None of these
70. holds the data read by text editor.
A. Text file B. Binary file C. (A) and (B) both D. None of these,
71. ... package has corresponding classes to work with different exceptions.
A. java.lang B. java.io C. java.hang D. (A) and (B) both
72. ......... keyword is used to make a program
A. try B. catch C. finally D. All of these
73. .... is incorrect for try block.
A. try block is a block included in braces
B. try block may create one or more options
C. try block tries to handle exceptions
D. the statements of try block are the instructions which we need to look after
74. Which of the following is an advantage of using a try....catch block?
A. Exceptional events are eliminated
B. Exceptional events are reduced
C. Exceptional events are integrated with regular events
D. Exceptional events are isolated from regular events
75. An attempt to access a non-existing file uses ............. exception class.
A. ArrayIndexOutOfBoundsException B. ArithmeticException C. FileNotFoundException D. All of these
76. If exceptions are generated using method or constructor then try-catch block are defined in ..... .
A. try-catch block is given in method or constructor
B. invoking the method or constructor inside try block
C. (A) or (B)
D. invoking the method or constructor directly in catch block
77. ......... does not provide built-in exception classes for application specific exceptions.
A. C++ B. C C. Java D. PHP
78. Instructions handling one or more exceptions are included in ...... .
A. try B. catch C. finally D. throw
79. What is the use of name of class in Java?
A. To declare the type of a variable B. To define a type of formal parameter C. To define type of return values D. All of these
80. …………is mainly used to initialize the values.
A. Constructors B. Inheritance C. Composition D. All of these
81. ....... access modifier has the least visibility.
A. Public B. Package C. Protect D. Private
82. …………. type of relationship between two classes is created in composition and aggregation.
A. has-a B. have-a C. is-a D. None of these
83. ..... is the best way to provide data encapsulation.
A. To make the data private as less as possible B. To make the data private as more as possible C. Tomake the data protected
as more as possible D. To make the data protected as less as possible
84. When mutator method is possible?
A. When we permit others to use the data B. When we modify the data and permit others C. (A) or (B) D. (A) and (B) both
85. method is used to display the attributes of object.
A. display() B. show() C. print() D. None of these
86. ………is the use of inheritance.
A. To stop the existing the class and create a new class.
B. To build a new class with added capabilities by expanding the existing class
C. To use the characteristics existing class again
D. (B) and (C) both
87. To sell an item through online auction, ………. is needed first.
A. registration B. booking C. purchasing D. transferring

88. Electronic news paper gives more advantages than………………. .


A. printed newspapers B. news telecast on television C. news telecast on radio D. all of these
89. In……………. model, bidding is done from the institutes to provide service or products.
A. Business to Consumer-B2C B. Business to Business-B2B C. Consumer to Consumer-C2C D. Consumer to Business-C2B
90. From where customer can select the product and give the order in B2C model?
A. At a specific time from specific location. B. Any time any location C. Anytime from specific location D. Only from specific
location
91. Which of the following E-commerce business model refers to E-commerce activities involving transactions between and among the
consumers?
A. Government to Business (G2B) B. Consumer to Consumer (C2C) C. Business to Business (B2B) D. Business to Consumer
(B2C)
92. When the item is transferred to the bidder?
A. Once the target price is reached B. The time limit is over C. (A) and (B) both D. None of these
93. A merchant can solve the problems ofcustomers through……………. .
A. e-mail B. online C. (A) or (B) D. personally
94. From the following, which command ensures that elements upto level 3 (subsubsection) are assigned number?
A. /setcounter(secnumdepth) (3) B. /setcounter{secnumdepth} {3} C. \setcounter(secnumdepth) {3} D.
\setcounter{secnumdepth} {3}
95. In which numerals, the parts are numbered?
A. Arabic numerals 1, 2, 3.... B. Alphabetic numbering A, B, C.... C. Roman numerals I, II, III D. Anyone
96. In LaTeX, what is written between
\begin{document} and \end{document}
?
A. Preamble B. Content C. (A) and (B) both D. None of these
97. What is done, if LaTeX has no knowledge about chapters or sections?
A. LaTeX must be run B. Program must be written in LaTeX C. Output must be generated in LaTeX D. LaTeX must be
restarted
98. From the following, which fonts use equal? width for all characters ?
A. Roman fonts B. Sans serif fonts C. Monospace fonts D. All of these
99. Which command is used to provide the title to the document ?
A. \title{the-title-of-the-document} B. /title{the-title-of-the-document} C. \head (the-title-of-the-document) D. /heading(the-
title-of-the-document)
100. By default, how are the articles printed?
A. One-sided B. Two-sided C. (A) or (B) D. None

All The Best


Subject : Computer Exam Time : 2 HOURS
Standard : 12 (EM) ANSWERS Date : 30/01/2024
Chapter : ALL Marks : 100

SECTION - A

Choose the correct option from those given below each question. (Each question carries 1 Marks) (Marks - 100)

1. HTML
2. Text
3. Initial Value
4. White
5. <form>...</form>
6. Submit Button
7. <option>...</option>
8. Text box
9. Netscape
10. Built-in
11. ruls
12. function
13. JavaScript
14. onsubmit()
15. Source
16. To specify styles for the visual elements
17. 3
18. error occurs.
19. (1→ i), (2→ iv), (3→ ii),(4 → iii)
20. (B) or (C)
21. (A) and (B) both
22. 0.5
23. "SAN"
24. \xdd
25. All of these
26. uploading
27. Insert→Link
28. In a directory
29. cookie property of the document object.

30. : (colon)
31. uploading
32. Notepad
33. data field
34. All of these
35. 'is-a' relationship
36. -
37. Class
38. (A) or (B)
39. Class Name
40. single inheritance
41. It is needed to convert the file in its original uncompressed form
42. 12.04
43. Mean (list)
44. All of these
45. Double-click
46. Stop button
47. RationalPlan single project
48. (A) and (B) both
49. All of these
50. Netscape
51. Cyber Grooming
52. Certification Authority
53. (A) or (B)
54. secure electronic transfer
55. Trademark

56. rows
57. both value and reference
58. There is no limit
59. (A) and (B) both
60. All of these
61. 65
62. 60
63. 5 rows and 3 columns
64. 00110101
65. One line of text
66. input
67. java.io
68. void write (string s)
69. (A) or (B)
70. Text file
71. (A) and (B) both
72. All of these
73. try block tries to handle exceptions
74. Exceptional events are integrated with regular events
75. FileNotFoundException
76. (A) or (B)
77. Java
78. catch
79. All of these
80. Constructors
81. Package
82. has-a
83. To make the data private as more as possible
84. When we permit others to use the data
85. show()
86. (B) and (C) both
87. registration
88. all of these
89. Consumer to Business-C2B
90. Any time any location
91. Consumer to Consumer (C2C)
92. (A) and (B) both
93. (A) or (B)
94. \setcounter{secnumdepth} {3}
95. Roman numerals I, II, III
96. (A) and (B) both
97. LaTeX must be run

98. Monospace fonts


99. \title{the-title-of-the-document}
100. One-sided

You might also like