0% found this document useful (0 votes)
46 views

ITWD

The document is an examination question booklet for the BCA (Second Semester) Examination in July 2022, specifically for the subject of Internet Technology and Web Design. It contains instructions for filling out the OMR sheet and a series of multiple-choice questions related to internet technology, web design, and programming concepts. The exam is timed for 1.5 hours and has a maximum score of 100 marks.

Uploaded by

tdhruvi111
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

ITWD

The document is an examination question booklet for the BCA (Second Semester) Examination in July 2022, specifically for the subject of Internet Technology and Web Design. It contains instructions for filling out the OMR sheet and a series of multiple-choice questions related to internet technology, web design, and programming concepts. The exam is timed for 1.5 hours and has a maximum score of 100 marks.

Uploaded by

tdhruvi111
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

Paper Code Á’uiqfLrdk Øekad

Question Booklet No.


Roll No.----------------------
3 6 5
(To be filled in the
OMR Sheet)

O.M.R. Serial No. Á’uiqfLrdk lhjht


Question Booklet Series
A
BCA (Second Semester) Examination, July-2022
BCA-2002
Internet Technology and Web Design
Time : 1:30 Hours Maximum Marks-100

tc rd dgk u tk;] bl Á’uiqfLrdk dks u [kksysa


funsZ’k % & 1. ijh{kkFkhZ vius vuqØekad] fo”k; ,oa Á’uiqfLrdk dh lhjht dk fooj.k ;FkkLFkku lgh& lgh Hkjsa]
vU;Fkk ewY;akdu esa fdlh Hkh Ádkj dh folaxfr dh n’kk esa mldh ftEesnkjh Lo;a ijh{kkFkhZ dh gksxhA
2. bl Á’uiqfLrdk esa 100 Á’u gSa] ftues ls dsoy 75 Á’uksa ds mRrj ijh{kkfFkZ;ksa }kjk fn;s tkus gSA
ÁR;sd Á’u ds pkj oSdfYid mRrj Á’u ds uhps fn;s x;s gSaA bu pkjksa esa ls dsoy ,d gh mRrj
lgh gSA ftl mRrj dks vki lgh ;k lcls mfpr le>rs gSa] vius mRrj i=d (O.M.R.
ANSWER SHEET) esa mlds v{kj okys o`Rr dks dkys ;k uhys cky IokabV isu ls iwjk Hkj nsaA
;fn fdlh ijh{kkFkhZ }kjk fdlh iz’u dk ,d ls vf/kd mŸkj fn;k tkrk gS] rks mls xyr mŸkj ekuk
K-365

tk;sxkA
3. ÁR;sd Á’u ds vad leku gSaA vki ds ftrus mRrj lgh gksaxs] mUgha ds vuqlkj vad Ánku fd;s
tk;saxsA
4. lHkh mRrj dsoy vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij gh fn;s tkus
gSaA mRrj i=d esa fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k mRrj ekU; ugha gksxkA
5. vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij dqN Hkh fy[kus ls iwoZ mlesa fn;s
x;s lHkh vuqns’kksa dks lko/kkuhiwoZd i<+ fy;k tk;A
6. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks viuh vksŒ,eŒvkjŒ ‘khV miyC/k djkus ds ckn
gh ijh{kk d{k ls ÁLFkku djsaA
7. fuxsfVo ekfdZax ugha gSA
egRoiw.kZ % & Á’uiqfLrdk [kksyus ij ÁFker% tkWp dj ns[k ysa fd Á’uiqfLrdk ds lHkh i`”B HkyhHkkWfr Nis gq, gSaA ;fn
Á’uiqfLrdk esa dksbZ deh gks] rks d{k fujh{kd dks fn[kkdj mlh lhjht dh nwljh Á’uiqfLrdk ÁkIr dj ysaA
Series-A BCA 2002 / K-365 Page - 2
1. A program that is used to view websites is called a :
(A) Browser
(B) Web viewer
(C) Spreadsheet
(D) Word processor
2. A typical modern computer uses :
(A) Valves
(B) LSI chips
(C) Vacuum tubes
(D) All of these
3. Which of the following is not a type of broadband internet connection ?
(A) Satellite
(B) DSL
(C) Dial up
(D) Cable
4. Servers are computers that provide resources to other computers connected to a :
(A) Client
(B) Mainframe
(C) Super computer
(D) Network
5. ARPANET stands for :
(A) Advanced Rehearse Projects Agency Network
(B) Advanced Research Projects Agency Newark
(C) Advanced Research Projects Agency Network
(D) None of these

Series-A BCA 2002 / K-365 Page - 3


6. The process of connecting to the internet account is :
(A) Sing in
(B) Sing out
(C) Login
(D) Logout
7. Internet is :
(A) A worldwide interconnected network of computers which use a common
protocol to communicate with one another
(B) A worldwide network of computers
(C) An interconnected network of computers
(D) A local computer network
8. Smart Card is :
(A) Processing unit for software handling
(B) Processing unit contains memory for storing data
(C) Microprocessor cards
(D) Special purpose cards
9. Sending an E-mail is similar to :
(A) Sending a package
(B) Talking on the phone
(C) Writing a letter
(D) Drawing a picture
10. Rules for exchanging data between computers are called :
(A) Procedures
(B) Protocols
(C) Hyperlinks
(D) Programs

Series-A BCA 2002 / K-365 Page - 4


11. The _____ project allows access to the universe of online information using two
simple user interface operations.
(A) World-wide web
(B) IP address
(C) Web browser
(D) All of these
12. A _____ is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web.
(A) HTTP
(B) E-mail
(C) Web browser
(D) Search Engine
13. ______ is the basic communication language or protocol of the internet.
(A) TCP/IP
(B) TCDP/IEP
(C) TCMP/IKP
(D) TCTP/ITP
14. HTML and XML are markup languages :
(A) Specially development for the web
(B) Are versions of SGML
(C) Are based on SGML
(D) Independent of SGML
15. Documents converted to ______ can be published to the web.
(A) Doc file
(B) Machine language
(C) http
(D) HTML
Series-A BCA 2002 / K-365 Page - 5
16. DNS is :
(A) The horizontal naming system
(B) The distributed hierarchical naming system
(C) The vertical naming system
(D) The client server system
17. The report card and merit list forms the :
(A) Input data
(B) Output data
(C) Data processing
(D) Central processing
18. Which of the following cannot be a part of an E-mail address ?
(A) Underscore (_)
(B) Space ()
(C) At sign (@)
(D) Period (-)
19. Most mail programs automatically complete the following two parts in an E-mail :
(A) Form : and Subject
(B) Form : and To
(C) From : and Date
(D) From : and Body
20. A world wide web contains web pages :
(A) Created using HTML
(B) With links to other web pages
(C) Residing in many computers linked together using HTML
(D) Residing in many computers

Series-A BCA 2002 / K-365 Page - 6


21. Which of the following option leads to the portability and security of Java ?

(A) Bytecode is executed by JVM

(B) The applet makes the Java code secure and portable

(C) Use of exception handling

(D) Dynamic binding between objects

22. ________ is used to find and fix bugs in the Java programs.

(A) JVM

(B) JRE

(C) JDK

(D) JDB

23. What is the return type of the hashCode() method in the object class ?

(A) Object

(B) Int

(C) Long

(D) Void

24. What does the expression float a = 35/0 return ?

(A) 0

(B) Not a Number

(C) Infinity

(D) Run time exception

Series-A BCA 2002 / K-365 Page - 7


25. What will be the output of the following program ?
public class Test {
public static void main(String[] args) {
int count = 1;
while (count <= 15) {
System.out.printIn(count % 2 == 1 ? “***” : “+++++”);
++count;
} // end while
} // end main
}
(A) 15 times ***
(B) 15 times +++++
(C) 8 times *** and 7 times +++++
(D) Both will print only once
26. Which of the following tool is used to generate API documentation in HTML
format from doc comments in source code ?
(A) javap tool
(B) javaw command
(C) Javadoc tool
(D) javah command
27. Which of the following for loop declaration is not valid ?
(A) for (int i = 99; i >= 0; i/9)
(B) for (int i = 7; i <= 77; i += 7)
(C) for (int i = 20; i >= 2; - -i)
(D) for (int i = 2; i <= 20; i = 2* i)

Series-A BCA 2002 / K-365 Page - 8


28. Secure Shell or SSH is a ______ protocol that allows data to be exchanged using a
secure channel between two networked devices.
(A) Network
(B) Control
(C) Internet
(D) Gateway
29. _____access is a reliable and scalable worldwide internet access service.
(A) Shell
(B) ISDN connection
(C) Dedicated access
(D) ISDN services
30. _______Internet access is a type of internet connectivity that operates through a

standard telephone line.

(A) Shell

(B) Dial up

(C) TCP/IP

(D) ISDN

31. In ______ internet connection, the user will get only a textual matter of a Web

Page.

(A) Shell

(B) Dial up

(C) TCP/IP

(D) ISDN

Series-A BCA 2002 / K-365 Page - 9


32. A web browser is a ______ side software program which communicates with web
servers on the internet and request information wanted by users.
(A) Client
(B) Server
(C) Peer to peer
(D) Host
33. _______ is the standard protocol that allows web clients and servers to
communicate.
(A) HTML
(B) FTP
(C) URL
(D) HTTP
34. _______ is a collection of interconnected documents and other resources, linked by

hyperlinks and URLs.

(A) IP

(B) FTP

(C) Web

(D) Host

35. _______ is a search tool that sends user requests to several other search engines

and/or databases and aggregates the results into a single list.

(A) Meta search engine

(B) CGL

(C) SGML

(D) Hyper search engine

Series-A BCA 2002 / K-365 Page - 10


36. The ______ level programming interface for the Apple implementation of Open
GL.
(A) CSS
(B) CGL
(C) SGML
(D) HTML
37. HTML markup language is a set of markup _______.
(A) Attributes
(B) Sets
(C) Groups
(D) Tags
38. Which tag inserts a line horizontally on the web page ?
(A) <hr>
(B) <line>
(C) <line direction=”horizontal”>
(D) <tr>
39. What is the correct HTML tag for inserting a line break ?
(A) <br>
(B) <lb>
(C) <break>
(D) <newline>
40. A web page displays a picture. What tag was used to display that picture ?
(A) image
(B) picture
(C) src
(D) img

Series-A BCA 2002 / K-365 Page - 11


41. When information is sent across the internet, the _______ first breaks the
information up into packets of data.
(A) Transmission control protocol
(B) User datagram protocol
(C) Internet protocol
(D) Session protocol
42. ________ is the address of the web document currently displayed on the monitor.
(A) TCP
(B) ISP
(C) URL
(D) UDP
43. _____ is a file left on the computer by a website’s browser containing user login,
password, user preferences and other personalized information.
(A) Server
(B) Cache
(C) Backup
(D) Cookie
44. The internet facility for downloading and uploading files are called _____.
(A) HTTP
(B) FTP
(C) ISP
(D) URL
45. _________ is a technology that governs the conduct which is socially acceptable in
an online or digital.
(A) Internet
(B) Internet crime
(C) Internet etiquette
(D) Internet theft

Series-A BCA 2002 / K-365 Page - 12


46. An _______ is a company that provides internet access to users or subscribers of its
service.
(A) ARPAnet
(B) Cyber net
(C) Internet Provider
(D) Internet Service Provider
47. The process of transferring files from a web page on the internet to your computer
is called.
(A) Uploading
(B) Forwarding
(C) Transferring
(D) Downloading
48. Moving from one website to another is called :
(A) Transferring
(B) Shifting
(C) Browsing
(D) Loading
49. Verification of a login name and password is known as ______.
(A) Configuration
(B) Accessibility
(C) Authentication
(D) Logging in
50. ______ is the oldest and most popular form of communication between computers.
(A) Messanger
(B) Chart
(C) VoIP
(D) E-Mail
Series-A BCA 2002 / K-365 Page - 13
51. The internet supports a large system called the ____.
(A) Private Network Access
(B) World Wide Web
(C) World Wide Access Point
(D) Network Access Point
52. _______ are set of rules and procedures for communicating.
(A) Programs
(B) Algorithms
(C) Protocols
(D) Mails
53. Each computer connected to the internet must _____.
(A) Be an IBM PC
(B) Have an unique IP address
(C) Be internet compatible
(D) Have a modem connection
54. A homepage is _______.
(A) An index of encyclopedia articles
(B) Where all internet data is stored
(C) Required for access to the internet
(D) The first page of a website
55. Employee in an organization can use a part of the private intranet is called ____.
(A) Internet
(B) Intranet private
(C) Extranet
(D) Cybernet

Series-A BCA 2002 / K-365 Page - 14


56. _____ is a document commonly written in Hyper Text Markup Language (HTML)
that is accessible through the internet or other network using an internet browser.
(A) Word
(B) Web page
(C) Web Site
(D) Windows
57. A web page is located using a ______.
(A) Universal Record Linking
(B) Uniform Resource Locator
(C) Universal Record Locator
(D) Uniformly Reachable Links
58. A piece of icon or image on a web page associated with another web page is
called_____.
(A) url
(B) hyperlink
(C) plugin
(D) connection
59. ______ is a computer program running to serve the requests of other programs.
(A) Server
(B) Client
(C) Software
(D) Application
60. A web cookie is a small piece of data ______.
(A) Sent from a website and stored in users web browser while a user is browsing
a website
(B) Sent from user and stored in the server while a user is browsing a website
(C) Sent from root server to all servers
(D) None of the mentioned

Series-A BCA 2002 / K-365 Page - 15


61. _________programs are automatically loaded and operates as a part of browser.
(A) Utilities
(B) Plug-ins
(C) Widgets
(D) Add-ons
62. A website’s _____ structure is more important to a user than its physical structure.
(A) Commercial
(B) Logical
(C) File
(D) Data
63. A site that links every page to every other page could be considered to exhibit a
structured called a _____.
(A) Mixed form
(B) Mixed hierarchy
(C) Full mesh
(D) Pure tree
64. W3C is known as ____.
(A) World Wide Web Consortium
(B) World Wide Web Consul
(C) World Wide Web Code
(D) World Wide Web Command
65. _____ is an FTP search tool for the internet.
(A) Google
(B) Archie
(C) Alta Vista
(D) Gopher

Series-A BCA 2002 / K-365 Page - 16


66. SMTP stands for ______.
(A) Simple Mail Transfer Protocol
(B) Simple Message Transfer Program
(C) Simple Mode Texting Program
(D) Simple Memory Transfer Protocol
67. A _______ is a network in which the computers are connected directly, usually by
some type of cable.
(A) LAN
(B) MAN
(C) CAN
(D) HAN
68. Once the email is sent, the message is broken into pieces called ______.
(A) Packets
(B) Process
(C) Digits
(D) Bytes
69. What is the domain used for non-profitable organizations ?
(A) .gov
(B) .ac
(C) .com
(D) .org
70. A _____ include the protocol the browser uses to access the file, server or domain
name, the relative path and the file name.
(A) Complete URL
(B) Incomplete URL
(C) Site URL
(D) Web URL

Series-A BCA 2002 / K-365 Page - 17


71. What is true about private constructor ?
(A) Private constructor ensures only one instance of a class exist at any point of
time
(B) Private constructor ensures multiple instances of a class exist at any point of
time
(C) Private constructor eases the instantiation of a class
(D) Private constructor allows creating objects in other classes
72. What is not the use of “this” keyword in Java ?
(A) Passing itself to another method
(B) Calling another constructor in constructor chaining
(C) Referring to the instance variable when local variable has the same name
(D) Passing itself to method of the same class
73. What would be the behaviour if one parameterized constructor is explicitly
defined?
(A) Compilation error
(B) Compilation succeeds
(C) Runtime error
(D) Compilation succeeds but at the time of creating object using default
constructor, it throws compilation error
74. What concepts come under Polymorphism in java ?

(A) Method overloading

(B) Constructor overloading

(C) Method overriding

(D) All the above

Series-A BCA 2002 / K-365 Page - 18


75. Which polymorphism behavior do you see in below class ?

class Paint {

// all methods have same name

public void Color(int x) {

public void Color(int x, int y) {

public void Color(int x, int y, int z) {

(A) Method overloading

(B) Constructor overloading

(C) Method overriding

(D) Run time polymorphism

76. Which polymorphism concept is applied to inheritance relationship in java

programming ?

(A) Method overloading

(B) Constructor overloading

(C) Method overriding

(D) None

Series-A BCA 2002 / K-365 Page - 19


77. In below java code, whose “Car” will be called ?
class Father {
public void car() {
System.out.println(“Father’s Car”);
}
}
class Son extends Father {

public void car() {


System.out.println(“Son’s Car”);
}
}
public class Sample {
public static void main(String[] args) {

Son john = new Son();


john.car();
}

}
(A) Father’s Car
(B) Son’s Car
(C) There is an ambiguity, so no one Car
(D) Compiler Error

Series-A BCA 2002 / K-365 Page - 20


78. Which of these selection statements test only for equality ?
(A) if
(B) switch
(C) if & switch
(D) None of the mentioned
79. Which of the following loops will execute the body of loop even when condition
controlling the loop is initially false ?
(A) Do-while
(B) While
(C) For
(D) None of the mentioned
80. Which of these jump statements can skip processing the remainder of the code in
its body for a particular iteration ?
(A) Break
(B) Return
(C) Exit
(D) Continue
81. Which of this keyword must be used to inherit a class ?
(A) Super
(B) This
(C) Extent
(D) Extends
82. A class member declared protected becomes a member of subclass of which type ?
(A) Public member
(B) Private member
(C) Protected member
(D) Static member

Series-A BCA 2002 / K-365 Page - 21


83. Which operator is used by Java run time implementations to free the memory of an
object when it is no longer needed ?
(A) Delete
(B) Free
(C) New
(D) None of the mentioned
84. Which function is used to perform some action when the object is to be destroyed ?
(A) finalize()
(B) delete()
(C) main()
(D) None of the mentioned
85. Web page editors works on a _______principle.
(A) WWW
(B) HTML
(C) WYSIWYG
(D) WYGWYSI
86. What is a CMS in web design ?
(A) Content Management System
(B) Creative Management System
(C) Content Mixing System
(D) Creatives Managerial System
87. Which of the following softwares could be used to build a website ?
(A) Power Point
(B) Excel
(C) Dream Weaver
(D) ERP

Series-A BCA 2002 / K-365 Page - 22


88. ________ is the conversion of data into a form, called a ciphertext that cannot be
easily understood by unauthorized people.
(A) Encryption
(B) Decryption
(C) Cypertext
(D) Plain text
89. _______ allow network administrators to limit a user’s access to specific services
on the network.
(A) Callback
(B) Packet address
(C) Authentication servers
(D) RADIUS
90. ______ hides the internal address and network topology of its protected domain
from outside.
(A) SAN
(B) SAT
(C) NAT
(D) ARP
91. ______ allows a computer to connect to a corporate LAN over the internet.
(A) VPN
(B) FTP
(C) HDN
(D) ARP
92. A _____ is a message given to a web browser by a web server which is stored by
the browser in a text file.
(A) Cache
(B) Cookie
(C) Temp
(D) Hosts
Series-A BCA 2002 / K-365 Page - 23
93. Which of the following component of web service describes interfaces to web
services ?
(A) UDDI
(B) WSDL
(C) SOAP
(D) None of the above
94. Which of the following is an example of connectivity ?
(A) Floppy Disk
(B) Data
(C) Internet
(D) Power card
95. Inventor of www (World Wide Web) is _______.
(A) Bill Gates
(B) Lee. N. Feyong
(C) Time Berners Lee
(D) Tom Berners Lee
96. Outlook Express is a ____.
(A) E-Mail Client
(B) Browser
(C) Search Engine
(D) None of the above
97. Web pages specifically for the ______.
(A) TV screen
(B) Mobile screen
(C) Computer screen
(D) ATM screen
Series-A BCA 2002 / K-365 Page - 24
98. Commonly used three Web-based image file formats are ____.
(A) GIF, JPG, PNG
(B) GIF, JPG, JPEG
(C) GIF, MP#, MP4
(D) GIF, MP3, PNG
99. The computer monitor displays color by mixing the _____ color light.
(A) Red, Green, Blue
(B) White, Black, Blue
(C) White, Black, Red
(D) White, Black, Green
100. JPG supports ______ bit colors.
(A) 8
(B) 24
(C) 64
(D) 112

******

Series-A BCA 2002 / K-365 Page - 25


Rough Work / jQ dk;Z

Series-A BCA 2002 / K-365 Page - 26


Rough Work / jQ dk;Z

Series-A BCA 2002 / K-365 Page - 27


DO NOT OPEN THE QUESTION BOOKLET UNTIL ASKED TO DO SO

1. Examinee should enter his / her roll number, subject and Question Booklet
Series correctly in the O.M.R. sheet, the examinee will be responsible for
the error he / she has made.
2. This Question Booklet contains 100 questions, out of which only 75
Question are to be Answered by the examinee. Every question has 4
options and only one of them is correct. The answer which seems
correct to you, darken that option number in your Answer Booklet
(O.M.R ANSWER SHEET) completely with black or blue ball point
pen. If any examinee will mark more than one answer of a particular
question, then the answer will be marked as wrong.
3. Every question has same marks. Every question you attempt correctly,
marks will be given according to that.
4. Every answer should be marked only on Answer Booklet (O.M.R
ANSWER SHEET).Answer marked anywhere else other than the
determined place will not be considered valid.
5. Please read all the instructions carefully before attempting anything on
Answer Booklet(O.M.R ANSWER SHEET).
6. After completion of examination, please hand over the O.M.R. SHEET to
the Examiner before leaving the examination room.
7. There is no negative marking.
Note: On opening the question booklet, first check that all the pages of the
question booklet are printed properly in case there is an issue please ask the
examiner to change the booklet of same series and get another one.

Series-A BCA 2002 / K-365 Page - 28


Paper Code Á’uiqfLrdk Øekad
Question Booklet No.
Roll No.----------------------
3 6 5
(To be filled in the
OMR Sheet)

O.M.R. Serial No. Á’uiqfLrdk lhjht


Question Booklet Series
C
BCA (Second Semester) Examination, July-2022
BCA-2002
Internet Technology and Web Design
Time : 1:30 Hours Maximum Marks-100

tc rd dgk u tk;] bl Á’uiqfLrdk dks u [kksysa


funsZ’k % & 1. ijh{kkFkhZ vius vuqØekad] fo”k; ,oa Á’uiqfLrdk dh lhjht dk fooj.k ;FkkLFkku lgh& lgh Hkjsa]
vU;Fkk ewY;akdu esa fdlh Hkh Ádkj dh folaxfr dh n’kk esa mldh ftEesnkjh Lo;a ijh{kkFkhZ dh gksxhA
2. bl Á’uiqfLrdk esa 100 Á’u gSa] ftues ls dsoy 75 Á’uksa ds mRrj ijh{kkfFkZ;ksa }kjk fn;s tkus gSA
ÁR;sd Á’u ds pkj oSdfYid mRrj Á’u ds uhps fn;s x;s gSaA bu pkjksa esa ls dsoy ,d gh mRrj
lgh gSA ftl mRrj dks vki lgh ;k lcls mfpr le>rs gSa] vius mRrj i=d (O.M.R.
ANSWER SHEET) esa mlds v{kj okys o`Rr dks dkys ;k uhys cky IokabV isu ls iwjk Hkj nsaA
;fn fdlh ijh{kkFkhZ }kjk fdlh iz’u dk ,d ls vf/kd mŸkj fn;k tkrk gS] rks mls xyr mŸkj ekuk
K-365

tk;sxkA
3. ÁR;sd Á’u ds vad leku gSaA vki ds ftrus mRrj lgh gksaxs] mUgha ds vuqlkj vad Ánku fd;s
tk;saxsA
4. lHkh mRrj dsoy vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij gh fn;s tkus
gSaA mRrj i=d esa fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k mRrj ekU; ugha gksxkA
5. vksŒ,eŒvkjŒ mRrj i=d (O.M.R. ANSWER SHEET) ij dqN Hkh fy[kus ls iwoZ mlesa fn;s
x;s lHkh vuqns’kksa dks lko/kkuhiwoZd i<+ fy;k tk;A
6. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks viuh vksŒ,eŒvkjŒ ‘khV miyC/k djkus ds ckn
gh ijh{kk d{k ls ÁLFkku djsaA
7. fuxsfVo ekfdZax ugha gSA
egRoiw.kZ % & Á’uiqfLrdk [kksyus ij ÁFker% tkWp dj ns[k ysa fd Á’uiqfLrdk ds lHkh i`”B HkyhHkkWfr Nis gq, gSaA ;fn
Á’uiqfLrdk esa dksbZ deh gks] rks d{k fujh{kd dks fn[kkdj mlh lhjht dh nwljh Á’uiqfLrdk ÁkIr dj ysaA
Series-C BCA 2002 / K-365 Page - 2
1. JPG supports ______ bit colors.
(A) 8
(B) 24
(C) 64
(D) 112
2. The computer monitor displays color by mixing the _____ color light.
(A) Red, Green, Blue
(B) White, Black, Blue
(C) White, Black, Red
(D) White, Black, Green
3. Commonly used three Web-based image file formats are ____.
(A) GIF, JPG, PNG
(B) GIF, JPG, JPEG
(C) GIF, MP#, MP4
(D) GIF, MP3, PNG
4. Web pages specifically for the ______.
(A) TV screen
(B) Mobile screen
(C) Computer screen
(D) ATM screen
5. Outlook Express is a ____.

(A) E-Mail Client

(B) Browser

(C) Search Engine

(D) None of the above

Series-C BCA 2002 / K-365 Page - 3


6. Inventor of www (World Wide Web) is _______.
(A) Bill Gates
(B) Lee. N. Feyong
(C) Time Berners Lee
(D) Tom Berners Lee
7. Which of the following is an example of connectivity ?
(A) Floppy Disk
(B) Data
(C) Internet
(D) Power card
8. Which of the following component of web service describes interfaces to web
services ?
(A) UDDI
(B) WSDL
(C) SOAP
(D) None of the above
9. A _____ is a message given to a web browser by a web server which is stored by
the browser in a text file.
(A) Cache
(B) Cookie
(C) Temp
(D) Hosts
10. ______ allows a computer to connect to a corporate LAN over the internet.
(A) VPN
(B) FTP
(C) HDN
(D) ARP
Series-C BCA 2002 / K-365 Page - 4
11. ______ hides the internal address and network topology of its protected domain
from outside.
(A) SAN
(B) SAT
(C) NAT
(D) ARP
12. _______ allow network administrators to limit a user’s access to specific services
on the network.
(A) Callback
(B) Packet address
(C) Authentication servers
(D) RADIUS
13. ________ is the conversion of data into a form, called a ciphertext that cannot be
easily understood by unauthorized people.
(A) Encryption
(B) Decryption
(C) Cypertext
(D) Plain text
14. Which of the following softwares could be used to build a website ?
(A) Power Point
(B) Excel
(C) Dream Weaver
(D) ERP
15. What is a CMS in web design ?
(A) Content Management System
(B) Creative Management System
(C) Content Mixing System
(D) Creatives Managerial System

Series-C BCA 2002 / K-365 Page - 5


16. Web page editors works on a _______principle.
(A) WWW
(B) HTML
(C) WYSIWYG
(D) WYGWYSI
17. Which function is used to perform some action when the object is to be destroyed ?
(A) finalize()
(B) delete()
(C) main()
(D) None of the mentioned
18. Which operator is used by Java run time implementations to free the memory of an
object when it is no longer needed ?
(A) Delete
(B) Free
(C) New
(D) None of the mentioned
19. A class member declared protected becomes a member of subclass of which type ?
(A) Public member
(B) Private member
(C) Protected member
(D) Static member
20. Which of this keyword must be used to inherit a class ?
(A) Super
(B) This
(C) Extent
(D) Extends
21. Which of these jump statements can skip processing the remainder of the code in
its body for a particular iteration ?
(A) Break
(B) Return
(C) Exit
(D) Continue

Series-C BCA 2002 / K-365 Page - 6


22. Which of the following loops will execute the body of loop even when condition
controlling the loop is initially false ?
(A) Do-while
(B) While
(C) For
(D) None of the mentioned
23. Which of these selection statements test only for equality ?
(A) if
(B) switch
(C) if & switch
(D) None of the mentioned
24. In below java code, whose “Car” will be called ?
class Father {
public void car() {
System.out.println(“Father’s Car”);
}
}
class Son extends Father {

public void car() {


System.out.println(“Son’s Car”);
}
}
public class Sample {
public static void main(String[] args) {

Son john = new Son();


john.car();
}

}
(A) Father’s Car
(B) Son’s Car
(C) There is an ambiguity, so no one Car
(D) Compiler Error

Series-C BCA 2002 / K-365 Page - 7


25. Which polymorphism concept is applied to inheritance relationship in java

programming ?

(A) Method overloading

(B) Constructor overloading

(C) Method overriding

(D) None

26. Which polymorphism behavior do you see in below class ?

class Paint {

// all methods have same name

public void Color(int x) {

public void Color(int x, int y) {

public void Color(int x, int y, int z) {

(A) Method overloading

(B) Constructor overloading

(C) Method overriding

(D) Run time polymorphism

Series-C BCA 2002 / K-365 Page - 8


27. What concepts come under Polymorphism in java ?

(A) Method overloading

(B) Constructor overloading

(C) Method overriding

(D) All the above

28. What would be the behaviour if one parameterized constructor is explicitly


defined?
(A) Compilation error
(B) Compilation succeeds
(C) Runtime error
(D) Compilation succeeds but at the time of creating object using default
constructor, it throws compilation error
29. What is not the use of “this” keyword in Java ?
(A) Passing itself to another method
(B) Calling another constructor in constructor chaining
(C) Referring to the instance variable when local variable has the same name
(D) Passing itself to method of the same class
30. What is true about private constructor ?
(A) Private constructor ensures only one instance of a class exist at any point of
time
(B) Private constructor ensures multiple instances of a class exist at any point of
time
(C) Private constructor eases the instantiation of a class
(D) Private constructor allows creating objects in other classes

Series-C BCA 2002 / K-365 Page - 9


31. A _____ include the protocol the browser uses to access the file, server or domain
name, the relative path and the file name.
(A) Complete URL
(B) Incomplete URL
(C) Site URL
(D) Web URL
32. What is the domain used for non-profitable organizations ?
(A) .gov
(B) .ac
(C) .com
(D) .org
33. Once the email is sent, the message is broken into pieces called ______.
(A) Packets
(B) Process
(C) Digits
(D) Bytes
34. A _______ is a network in which the computers are connected directly, usually by
some type of cable.
(A) LAN
(B) MAN
(C) CAN
(D) HAN
35. SMTP stands for ______.
(A) Simple Mail Transfer Protocol
(B) Simple Message Transfer Program
(C) Simple Mode Texting Program
(D) Simple Memory Transfer Protocol

Series-C BCA 2002 / K-365 Page - 10


36. _____ is an FTP search tool for the internet.
(A) Google
(B) Archie
(C) Alta Vista
(D) Gopher
37. W3C is known as ____.
(A) World Wide Web Consortium
(B) World Wide Web Consul
(C) World Wide Web Code
(D) World Wide Web Command
38. A site that links every page to every other page could be considered to exhibit a
structured called a _____.
(A) Mixed form
(B) Mixed hierarchy
(C) Full mesh
(D) Pure tree
39. A website’s _____ structure is more important to a user than its physical structure.
(A) Commercial
(B) Logical
(C) File
(D) Data
40. _________programs are automatically loaded and operates as a part of browser.
(A) Utilities
(B) Plug-ins
(C) Widgets
(D) Add-ons

Series-C BCA 2002 / K-365 Page - 11


41. A web cookie is a small piece of data ______.
(A) Sent from a website and stored in users web browser while a user is browsing
a website
(B) Sent from user and stored in the server while a user is browsing a website
(C) Sent from root server to all servers
(D) None of the mentioned
42. ______ is a computer program running to serve the requests of other programs.
(A) Server
(B) Client
(C) Software
(D) Application
43. A piece of icon or image on a web page associated with another web page is
called_____.
(A) url
(B) hyperlink
(C) plugin
(D) connection
44. A web page is located using a ______.
(A) Universal Record Linking
(B) Uniform Resource Locator
(C) Universal Record Locator
(D) Uniformly Reachable Links
45. _____ is a document commonly written in Hyper Text Markup Language (HTML)
that is accessible through the internet or other network using an internet browser.
(A) Word
(B) Web page
(C) Web Site
(D) Windows

Series-C BCA 2002 / K-365 Page - 12


46. Employee in an organization can use a part of the private intranet is called ____.
(A) Internet
(B) Intranet private
(C) Extranet
(D) Cybernet
47. A homepage is _______.
(A) An index of encyclopedia articles
(B) Where all internet data is stored
(C) Required for access to the internet
(D) The first page of a website
48. Each computer connected to the internet must _____.
(A) Be an IBM PC
(B) Have an unique IP address
(C) Be internet compatible
(D) Have a modem connection
49. _______ are set of rules and procedures for communicating.
(A) Programs
(B) Algorithms
(C) Protocols
(D) Mails
50. The internet supports a large system called the ____.
(A) Private Network Access
(B) World Wide Web
(C) World Wide Access Point
(D) Network Access Point

Series-C BCA 2002 / K-365 Page - 13


51. ______ is the oldest and most popular form of communication between computers.
(A) Messanger
(B) Chart
(C) VoIP
(D) E-Mail
52. Verification of a login name and password is known as ______.
(A) Configuration
(B) Accessibility
(C) Authentication
(D) Logging in
53. Moving from one website to another is called :
(A) Transferring
(B) Shifting
(C) Browsing
(D) Loading
54. The process of transferring files from a web page on the internet to your computer
is called.
(A) Uploading
(B) Forwarding
(C) Transferring
(D) Downloading
55. An _______ is a company that provides internet access to users or subscribers of its
service.
(A) ARPAnet
(B) Cyber net
(C) Internet Provider
(D) Internet Service Provider

Series-C BCA 2002 / K-365 Page - 14


56. _________ is a technology that governs the conduct which is socially acceptable in
an online or digital.
(A) Internet
(B) Internet crime
(C) Internet etiquette
(D) Internet theft
57. The internet facility for downloading and uploading files are called _____.
(A) HTTP
(B) FTP
(C) ISP
(D) URL
58. _____ is a file left on the computer by a website’s browser containing user login,
password, user preferences and other personalized information.
(A) Server
(B) Cache
(C) Backup
(D) Cookie
59. ________ is the address of the web document currently displayed on the monitor.
(A) TCP
(B) ISP
(C) URL
(D) UDP
60. When information is sent across the internet, the _______ first breaks the
information up into packets of data.
(A) Transmission control protocol
(B) User datagram protocol
(C) Internet protocol
(D) Session protocol

Series-C BCA 2002 / K-365 Page - 15


61. A web page displays a picture. What tag was used to display that picture ?
(A) image
(B) picture
(C) src
(D) img
62. What is the correct HTML tag for inserting a line break ?
(A) <br>
(B) <lb>
(C) <break>
(D) <newline>
63. Which tag inserts a line horizontally on the web page ?
(A) <hr>
(B) <line>
(C) <line direction=”horizontal”>
(D) <tr>
64. HTML markup language is a set of markup _______.
(A) Attributes
(B) Sets
(C) Groups
(D) Tags
65. The ______ level programming interface for the Apple implementation of Open
GL.
(A) CSS
(B) CGL
(C) SGML
(D) HTML

Series-C BCA 2002 / K-365 Page - 16


66. _______ is a search tool that sends user requests to several other search engines

and/or databases and aggregates the results into a single list.

(A) Meta search engine

(B) CGL

(C) SGML

(D) Hyper search engine

67. _______ is a collection of interconnected documents and other resources, linked by

hyperlinks and URLs.

(A) IP

(B) FTP

(C) Web

(D) Host

68. _______ is the standard protocol that allows web clients and servers to
communicate.
(A) HTML
(B) FTP
(C) URL
(D) HTTP
69. A web browser is a ______ side software program which communicates with web
servers on the internet and request information wanted by users.
(A) Client
(B) Server
(C) Peer to peer
(D) Host

Series-C BCA 2002 / K-365 Page - 17


70. In ______ internet connection, the user will get only a textual matter of a Web

Page.

(A) Shell

(B) Dial up

(C) TCP/IP

(D) ISDN

71. _______Internet access is a type of internet connectivity that operates through a

standard telephone line.

(A) Shell

(B) Dial up

(C) TCP/IP

(D) ISDN

72. _____access is a reliable and scalable worldwide internet access service.


(A) Shell
(B) ISDN connection
(C) Dedicated access
(D) ISDN services
73. Secure Shell or SSH is a ______ protocol that allows data to be exchanged using a
secure channel between two networked devices.
(A) Network
(B) Control
(C) Internet
(D) Gateway

Series-C BCA 2002 / K-365 Page - 18


74. Which of the following for loop declaration is not valid ?
(A) for (int i = 99; i >= 0; i/9)
(B) for (int i = 7; i <= 77; i += 7)
(C) for (int i = 20; i >= 2; - -i)
(D) for (int i = 2; i <= 20; i = 2* i)
75. Which of the following tool is used to generate API documentation in HTML
format from doc comments in source code ?
(A) javap tool
(B) javaw command
(C) Javadoc tool
(D) javah command
76. What will be the output of the following program ?
public class Test {
public static void main(String[] args) {
int count = 1;
while (count <= 15) {
System.out.printIn(count % 2 == 1 ? “***” : “+++++”);
++count;
} // end while
} // end main
}
(A) 15 times ***
(B) 15 times +++++
(C) 8 times *** and 7 times +++++
(D) Both will print only once

Series-C BCA 2002 / K-365 Page - 19


77. What does the expression float a = 35/0 return ?

(A) 0

(B) Not a Number

(C) Infinity

(D) Run time exception

78. What is the return type of the hashCode() method in the object class ?

(A) Object

(B) Int

(C) Long

(D) Void

79. ________ is used to find and fix bugs in the Java programs.

(A) JVM

(B) JRE

(C) JDK

(D) JDB

80. Which of the following option leads to the portability and security of Java ?

(A) Bytecode is executed by JVM

(B) The applet makes the Java code secure and portable

(C) Use of exception handling

(D) Dynamic binding between objects

Series-C BCA 2002 / K-365 Page - 20


81. A world wide web contains web pages :
(A) Created using HTML
(B) With links to other web pages
(C) Residing in many computers linked together using HTML
(D) Residing in many computers
82. Most mail programs automatically complete the following two parts in an E-mail :
(A) Form : and Subject
(B) Form : and To
(C) From : and Date
(D) From : and Body
83. Which of the following cannot be a part of an E-mail address ?
(A) Underscore (_)
(B) Space ()
(C) At sign (@)
(D) Period (-)
84. The report card and merit list forms the :
(A) Input data
(B) Output data
(C) Data processing
(D) Central processing
85. DNS is :
(A) The horizontal naming system
(B) The distributed hierarchical naming system
(C) The vertical naming system
(D) The client server system

Series-C BCA 2002 / K-365 Page - 21


86. Documents converted to ______ can be published to the web.
(A) Doc file
(B) Machine language
(C) http
(D) HTML
87. HTML and XML are markup languages :
(A) Specially development for the web
(B) Are versions of SGML
(C) Are based on SGML
(D) Independent of SGML
88. ______ is the basic communication language or protocol of the internet.
(A) TCP/IP
(B) TCDP/IEP
(C) TCMP/IKP
(D) TCTP/ITP
89. A _____ is a software application for retrieving, presenting, and traversing
information resources on the World Wide Web.
(A) HTTP
(B) E-mail
(C) Web browser
(D) Search Engine
90. The _____ project allows access to the universe of online information using two
simple user interface operations.
(A) World-wide web
(B) IP address
(C) Web browser
(D) All of these

Series-C BCA 2002 / K-365 Page - 22


91. Rules for exchanging data between computers are called :
(A) Procedures
(B) Protocols
(C) Hyperlinks
(D) Programs
92. Sending an E-mail is similar to :
(A) Sending a package
(B) Talking on the phone
(C) Writing a letter
(D) Drawing a picture
93. Smart Card is :
(A) Processing unit for software handling
(B) Processing unit contains memory for storing data
(C) Microprocessor cards
(D) Special purpose cards
94. Internet is :
(A) A worldwide interconnected network of computers which use a common
protocol to communicate with one another
(B) A worldwide network of computers
(C) An interconnected network of computers
(D) A local computer network
95. The process of connecting to the internet account is :
(A) Sing in
(B) Sing out
(C) Login
(D) Logout

Series-C BCA 2002 / K-365 Page - 23


96. ARPANET stands for :

(A) Advanced Rehearse Projects Agency Network

(B) Advanced Research Projects Agency Newark

(C) Advanced Research Projects Agency Network

(D) None of these

97. Servers are computers that provide resources to other computers connected to a :

(A) Client

(B) Mainframe

(C) Super computer

(D) Network

98. Which of the following is not a type of broadband internet connection ?

(A) Satellite

(B) DSL

(C) Dial up

(D) Cable

99. A typical modern computer uses :

(A) Valves

(B) LSI chips

(C) Vacuum tubes

(D) All of these


Series-C BCA 2002 / K-365 Page - 24
100. A program that is used to view websites is called a :

(A) Browser

(B) Web viewer

(C) Spreadsheet

(D) Word processor

******

Series-C BCA 2002 / K-365 Page - 25


Rough Work / jQ dk;Z

Series-C BCA 2002 / K-365 Page - 26


Rough Work / jQ dk;Z

Series-C BCA 2002 / K-365 Page - 27


DO NOT OPEN THE QUESTION BOOKLET UNTIL ASKED TO DO SO

1. Examinee should enter his / her roll number, subject and Question Booklet
Series correctly in the O.M.R. sheet, the examinee will be responsible for
the error he / she has made.
2. This Question Booklet contains 100 questions, out of which only 75
Question are to be Answered by the examinee. Every question has 4
options and only one of them is correct. The answer which seems
correct to you, darken that option number in your Answer Booklet
(O.M.R ANSWER SHEET) completely with black or blue ball point
pen. If any examinee will mark more than one answer of a particular
question, then the answer will be marked as wrong.
3. Every question has same marks. Every question you attempt correctly,
marks will be given according to that.
4. Every answer should be marked only on Answer Booklet (O.M.R
ANSWER SHEET).Answer marked anywhere else other than the
determined place will not be considered valid.
5. Please read all the instructions carefully before attempting anything on
Answer Booklet(O.M.R ANSWER SHEET).
6. After completion of examination, please hand over the O.M.R. SHEET to
the Examiner before leaving the examination room.
7. There is no negative marking.
Note: On opening the question booklet, first check that all the pages of the
question booklet are printed properly in case there is an issue please ask the
examiner to change the booklet of same series and get another one.

Series-C BCA 2002 / K-365 Page - 28


Roll No. .................................... Question Booklet Number

O. M. R. Serial No.

B. C. A. (Second Semester) EXAMINATION, 2022-23


INTERNET TECHNOLOGY AND WEB DESIGN
Questions Booklet
Paper Code Series

B C A 2 0 0 2 A
Time : 1:30 Hours ] [ Maximum Marks : 75

Instructions to the Examinee : ijh{kkfFkZ;ksa ds fy, funsZ’k %

1. Do not open the booklet unless you are 1. iz’u&iqfLrdk dks rc rd u [kksyas tc rd vkils dgk
asked to do so. u tk,A

2. The booklet contains 100 questions. 2. iz’u&iqfLrdk esa 100 iz’u gSaA ijh{kkFkhZ dks 75 iz’uksa
Examinee is required to answer 75 dks dsoy nh xbZ OMR vkUlj&’khV ij gh gy djuk
questions in the OMR Answer-Sheet
gS iz’u&iqfLrdk ij ughaA lHkh iz’uksa ds vad leku
provided and not in the question booklet.
All questions carry equal marks. gSaA

3. Examine the Booklet and the OMR Answer- 3. iz’uksa ds mŸkj vafdr djus ls iwoZ iz’u&iqfLrdk rFkk
Sheet very carefully before you proceed. OMR vkUlj&’khV dks lko/kkuhiwod
Z ns[k ysAa nks”kiw.kZ
Faulty question booklet due to missing or
iz’u&iqfLrdk ftlesa dqN Hkkx Nius ls NwV x, gksa ;k
duplicate pages/questions or having any
iz’u ,d ls vf/kd ckj Ni x, gksa ;k mlesa fdlh
other discrepancy should be got
immediately replaced. vU; izdkj dh deh gks rks mls rqjUr cny ysAa

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
(Only for Rough Work)

(Remaining instructions on the last page) ¼’ks”k funs’Z k vfUre i`”B ij½
1. Rules for exchanging data between 5. Which of the following is not a type of
computers are called : broadband internet connection ?

(A) Procedures (A) Satellite


(B) Protocols (B) DSL
(C) Hyperlinks (C) Dial up
(D) Programs (D) Cable

2. Smart card is : 6. ARPANET stands for :


(A) Processing unit for software (A) Advanced Rehearse Projects
handling Agency Network

(B) Processing unit containing memory (B) Advanced Research Projects


Agency Newark
for storing data
(C) Advanced Research Projects
(C) Microprocessor cards
Agency Network
(D) Special purpose cards
(D) None of the above
3. Servers are computers that provide
7. Internet is :
resources to other computers connected to
(A) A worldwide interconnected
a:
network of computers which use a
(A) Client common protocol to communicate
(B) Mainframe with one another

(C) Supercomputer (B) A worldwide network of computers


(C) An interconnected network of
(D) Network
computers
4. A program that is used to view websites (D) A local computer network
is called a :
8. A typical modern computer uses :
(A) Browser
(A) Valves
(B) Web viewer
(B) LSI chips
(C) Spreadsheet (C) Vacuum tubes
(D) Word processor (D) All of the above

BCA-2002 (3) Set-A


9. The process of connecting to the internet 14. The ................. project allows access to
account is : the universe of online information using
(A) Sing in two simple user interface operations.
(B) Sing out
(A) World-Wide Web
(C) Login
(B) IP address
(D) Logout
(C) Web browser
10. Sending an E-mail is similar to :
(D) All of the above
(A) Sending a package
(B) Talking on the phone 15. ............... is the basic communication
(C) Writing a letter
language or protocol of the internet.
(D) Drawing a picture
(A) TCP/IP
11. A world wide web contains web pages :
(B) TCDP/IEP
(A) Created using HTML
(C) TCMP/IKP
(B) With links to other web pages
(D) TCTP/ITP
(C) Residing in many computers linked
together using HTML
16. Documents converted to .............. can be
(D) Residing in many computers
published to the web.
12. Which of the following cannot be a part
(A) Doc file
of an E-mail address ?
(B) Machine language
(A) Underscore (_)
(C) http
(B) Space ( )
(C) At sign (@) (D) HTML

(D) Period (-)


17. The report card and merit list forms the :
13. HTML and XML are markup languages :
(A) Input data
(A) specially development for the web
(B) Output data
(B) are versions of SGML
(C) Data processing
(C) are based on SGML
(D) independent of SGML (D) Central processing

BCA-2002 (4) Set-A


18. A ................ is a software application for 22. Secure Shell or SSH is a ..................
retrieving, presenting, and traversing protocol that allows data be exchanged
information resources on the World Wide using a secure channel between two
Web. networked devices.
(A) HTTP (A) Network
(B) E-mail (B) Control
(C) Web Browser (C) Internet
(D) Search Engine (D) Gateway

19. DNS is :
23. What does the expression float a = 35/ 0
(A) the horizontal naming system return ?
(B) the distributed hierarchical naming
(A) 0
system
(B) Not a Number
(C) the vertical naming system
(C) Infinity
(D) the client server system
(D) Run time exception
20. Most mail programs automatically
24. Which of the following option leads to
complete the following two parts in an
the portability and security of Java ?
E-mail :
(A) Bytecode is executed by JVM
(A) Form : and Subject
(B) The applet makes the Java code
(B) Form : and To
secure and portable
(C) From : and Date
(C) Use of exception handling
(D) From : and Body
(D) Dynamic binding between objects
21. ............. Internet access is a type of
Internet connectivity that operates 25. What is the return of the hashCode ()

through a standard telephone line. method in the Object class ?

(A) Shell (A) Object

(B) Dial up (B) int

(C) TCP/IP (C) long

(D) ISDN (D) void

BCA-2002 (5) Set-A


26. What will be the output of the following 29. Which of the following tool is used to
program ? generate API documentation in HTML
public class Test { format from doc comments in source
public static void main (String [] args) { code ?
int count = 1; (A) javap tool
while (count < = 15) {
(B) javaw command
System.out.printin (count % 2 ==1 ?
(C) Javadoc tool
“***” : “+++++”);
(D) javah command
++count;
} // end while 30. ............... access is a reliable and scalable
} // end main worldwide Interent access service.
} (A) Shell
(A) 15 times *** (B) ISDN connection
(B) 15 times +++++
(C) Dedicated access
(C) 8 times *** and 7 times +++++
(D) ISDN services
(D) Both will print only once
31. A web page displays a picture. What tag
27. Which of the following for loop
was used to display that picture ?
declarations is not valid ?
(A) image
(A) for (int i = 99; i > = 0; i /9)
(B) picture
(B) for (int i = 7; i < = 77; i + = 7)
(C) src
(C) for (int i = 20; i > = 2; -- i)
(D) img
(D) for (int i = 2; i < = 20; i = 2* i)

32. Which tag inserts a line horizontally on


28. .............. is used to find and fix bugs in
the Java programs. the web page ?

(A) JVM (A) <hr>

(B) JRE (B) <line>

(C) JDK (C) <line direction =” horizontal”>

(D) JDB (D) <tr>

BCA-2002 (6) Set-A


33. .............. is a collection of interconnected 37. HTML markup language is a set of
documents and other resources, linked by markup ................
hyperlinks and URLs. (A) Attributes
(A) IP (B) Sets
(B) FTP
(C) Groups
(C) Web
(D) Tags
(D) Host
38. A web browser is a .................. side
34. In ................. Internet connection, the
software program which communicates
user will get only a textual matter of a
with web servers on the internet and
Web Page.
request information wanted by users.
(A) Shell
(A) Client
(B) Dial up
(C) TCP/IP (B) Server

(D) ISDN (C) Peer to peer


(D) Host
35. ................ is the standard protocol that
allows web clients and servers to 39. The .................. level programming
communicate. interface for the Apple implementation of
(A) HTML Open GL.
(B) FTP (A) CSS
(C) URL (B) CGL
(D) HTTP
(C) SGML
36. ............. is a search tool that sends user (D) HTML
requests to several other search engines
40. What is the correct HTML tag for
and /or databases and aggregates the
inserting a line break ?
results into a single list.
(A) <br>
(A) Meta search engine
(B) CGL (B) <lb>

(C) SGML (C) <break>

(D) Hyper search engine (D) <newline>

BCA-2002 (7) Set-A


41. .................. is the oldest and most popular 45. ................ is a file left on the computer by
form of communication between a website’s browser containing user

computers. login, password, user preferences and


other personalized information.
(A) Messenger
(A) Server
(B) Chart
(B) Cache
(C) VoIP
(C) Backup
(D) E-Mail
(D) Cookie

42. Moving from one website to another is 46. ................ is a technology that governs
called : the conduct which is socially acceptable

(A) transferring in an online or digital.

(B) shifting (A) Internet


(B) Internet crime
(C) browsing
(C) Internet etiquette
(D) loading
(D) Internet theft
43. The Internet facility for downloading and
47. The process of transferring files from a
uploading files are called .........
web page on the internet to your
(A) HTTP computer is called :
(B) FTP (A) Uploading
(C) ISP (B) Forwarding

(D) URL (C) Transferring


(D) Downloading
44. When information is sent across the
48. .............. is the address of the web
internet, the ............... first breaks the
document currently displayed on the
information up into packets of data.
monitor.
(A) Transmission control protocol
(A) TCP
(B) User datagram protocol
(B) ISP
(C) Internet protocol (C) URL
(D) Session protocol (D) UDP

BCA-2002 (8) Set-A


49. A/An .................. is a company that 53. A homepage is ............
provides internet access to users or (A) an index of encyclopedia articles
subscribers of its service. (B) where all Internet data is stored
(A) ARPAnet (C) required for access to the Internet
(B) Cyber net (D) the first page of a website
(C) Internet Provider
54. The internet supports a large system
(D) Internet Service Provider
called the ..............
50. Verification of a login name and (A) Private Network Access
password is known as ............ . (B) World Wide Web
(A) configuration (C) World Wide Access Point
(B) accessibility (D) Network Access Point
(C) authentication
55. Each computer connected to the internet
(D) logging in
must ................
51. A web cookie is a small piece of data
(A) be a IBM PC
.......... .
(B) have an unique IP address
(A) sent from a website and stored in (C) be internet compatible
users web browser while a user is
(D) have a modern connection
browsing a website
56. Employee in an organization can use a
(B) sent from user and stored in the
part of the private intranet is called
server while a user is browsing a
............. .
website
(C) sent from root server to all servers (A) internet

(D) None of the mentioned (B) intranet private


(C) extranet
52. A piece of a icon or image on a web page
(D) cybernet
associated with another webpage is called
.............. 57. A web page is located using a ............

(A) url (A) Universal Record Linking


(B) hyperlink (B) Uniform Resource Locator
(C) plugin (C) Universal Record Locator
(D) connection (D) Uniformly Reachable Links

BCA-2002 (9) Set-A


58. ............. are set of rules and procedures 62. Once the email is sent, the message is
for communicating. broken into pieces called ........ .
(A) Programs
(A) Packets
(B) Algorithms
(C) Protocols (B) Process

(D) Mails (C) Digits

59. ............. is a document commonly written (D) Bytes


in Hyper Text Markup Language
63. W3C is known as ............... .
(HTML) that is accessible through the
Internet or other network using an (A) World Wide Web Consortium
internet browser. (B) World Wide Web Consul
(A) Word
(C) World Wide Web Code
(B) Web page
(D) World Wide Web Command
(C) Web Site
(D) Windows 64. ............... programs are automatically

60. ................. is a computer program loaded and operates as a part of browser.


running to serve the requests of other
(A) Utilities
programs.
(B) Plug-ins
(A) Server
(B) Client (C) Widgets

(C) Software (D) Add-ons


(D) Application
65. A site that links every page to every other
61. A ................. include the protocol the
page could be considered to exhibit a
browser uses to access the file, server or
domain name, the relative path and the structured called a ............. .

file name. (A) mixed form


(A) Complete URL (B) mixed hierarchy
(B) Incomplete URL
(C) full mesh
(C) Site URL
(D) Web URL (D) pure tree

BCA-2002 ( 10 ) Set-A
66. ................ is an FTP search tool for the 70. What is the domain used for non-

internet. profitable organizations ?

(A) Google (A) .gov

(B) Archie (B) .ac

(C) Alta Vista (C) .com

(D) Gopher (D) .org

67. A ................... is a network in which the 71. Which of these jump statements can skip

computers are connected directly, usually processing the remainder of the code in

be some type of cable. its body for a particular iteration ?

(A) LAN (A) break

(B) MAN (B) return

(C) CAN (C) exit

(D) HAN (D) continue

68. A website’s ............... structure is more 72. Which of these selection statements test

important to a user than its physical only for equality ?

structure. (A) if

(A) commercial (B) switch

(B) logical (C) if & switch

(C) file (D) None of the mentioned

(D) data
73. What concepts come under

69. SMTP stands for ............. Polymorphism in java ?

(A) Simple Mail Transfer Protocol (A) Method overloading

(B) Simple Message Transfer Program (B) Constructor overloading

(C) Simple Mode Texting Program (C) Method overriding

(D) Simple Memory Transfer Protocol (D) All of the above

BCA-2002 ( 11 ) Set-A
(A) Method overloading
74. What is true about private constructor ?
(B) Constructor overloading
(A) Private constructor ensures only
(C) Method overriding
one instance of a class exist at any
point of time (D) Run time polymorphism
(B) Private constructor ensures multiple 77. In below java code, whose “Car” will be
instances of a class exist at any
called ?
point of time
class Father {
(C) Private constructor eases the
instantiation of a class
public void car() {
(D) Private constructor allows creating
objects in other classes
System.out.println(“Father’s Car”);
75. What would be the behaviour if one
}
parameterized constructor is explicitly
}
defined ?
class Son extends Father {
(A) Compilation error
public void car() {
(B) Compilation succeeds
(C) Runtime error
System.out.println(“Son’s Car”);
(D) Compilation succeeds but at the
}
time of creating object using
}
default constructor, it throws
public class Sample {
compilation error
public static void main(String[]
76. Which polymorphism behavior do you args) {
see in the following class ?
Son john = new
class Paint {
Son();
// all methods have same name
john.car();
public void Color(int x) {
}
}
}
public void Color(int x, int y) {
} (A) Father’s Car

public void Color(int x, int y, int (B) Son’s Car


z) { (C) There is an ambiguity, so no one

} Car
} (D) Compiler Error

BCA-2002 ( 12 ) Set-A
78. What is not the use of “this” keyword in 81. ............ hides the internal address and

Java ? network topology of its protected domain


from outside
(A) Passing itself to another method
(A) SAN
(B) Calling another constructor in
(B) SAT
constructor chaining
(C) NAT
(C) Referring to the instance variable
(D) ARP
when local variable has the same
82. ............... is the conversion of data into a
name
form, called a ciphertext that cannot be
(D) Passing itself to method of the same easily understood by unauthorized
class people.

(A) Encryption
79. Which polymorphism concept is applied
(B) Decryption
to inheritance relationship in java
(C) Cypertext
programming ?
(D) Plain text
(A) Method overloading
83. Which function is used to perform some
(B) Constructor overloading
action when the object is to be
(C) Method overriding
destroyed ?
(D) None of the above (A) finalize()
(B) delete()
80. Which of the following loops will
(C) main()
execute the body of loop even when
(D) None of the mentioned
condition controlling the loop is initially

false ? 84. Which of this keyword must be used to


inherit a class ?
(A) do-while
(A) super
(B) while
(B) this
(C) for
(C) extent
(D) None of the mentioned (D) extends

BCA-2002 ( 13 ) Set-A
85. Which operator is used by Java run time 89. What is a CMS in web design ?
implementations to free the memory of an (A) Content Management System
object when it is no longer needed ? (B) Creative Management System
(C) Content Mixing System
(A) delete
(D) Creatives Managerial System
(B) free

(C) new 90. .................. allow network administrators


to limit a user’s access to specific
(D) None of the mentioned
services on the network.
86. Web page editors works on a ................. (A) Callback
principle. (B) Packet address

(A) WWW (C) Authentication servers


(D) RADIUS
(B) HTML

(C) WYSIWYG 91. JPG supports ................... bit colours

(D) WYGWYSI (A) 8


(B) 24
87. Which of the following softwares could
(C) 64
be used to build a website ? (D) 112
(A) Power Point
92. Commonly used three Web-based image
(B) Excel file formats are ............. .
(C) Dream Weaver (A) GIF, JPG, PNG
(D) ERP (B) GIF, JPG, JPEG
(C) GIF, MP#, MP4
88. A class member declared protected
(D) GIF, MP3, PNG
becomes a member of subclass of which
93. Which of the following is an example of
type ?
connectivity ?
(A) public member
(A) Floppy Disk
(B) private member
(B) Data
(C) protected member (C) Internet
(D) static member (D) Power card

BCA-2002 ( 14 ) Set-A
94. ............. allows a computer to connect to 98. A ........... is a message given to a web

a corporate LAN over the internet. browser by a web server which is stored

(A) VPN by the browser in a text file.


(B) FTP
(A) Cache
(C) HDN

(D) ARP (B) Cookie

95. Which of the following component of (C) Temp


Web service describes interfaces to web
(D) Hosts
services ?

(A) UDDI
99. Outlook Express is a/an ..............
(B) WSDL

(C) SOAP (A) E-Mail Client.

(D) None of the above


(B) Browser.

96. Inventor of www (world wide web)


(C) Search Engine.
is .................

(A) Bill Gates (D) None of the above

(B) Lee. N. Feyong


100. The computer monitor displays color by
(C) Tim Berners Lee
mixing the ............. color light.
(D) Tom Berners Lee

97. Web pages are specifically for (A) red, green, blue

the .................
(B) white, black, blue
(A) TV screen
(C) white, black, red
(B) mobile screen

(C) computer screen (D) white, black, green


(D) ATM screen

BCA-2002 ( 15 ) Set-A
4. Four alternative answers are mentioned for 4. iz’u&iqfLrdk esa izR;sd iz’u ds pkj lEHkkfor mŸkj
each question as—A, B, C & D in the booklet. A, B, C ,oa D gSaA ijh{kkFkhZ dks mu pkjksa fodYiksa esa ls
The candidate has to choose the correct
answer and mark the same in the OMR
lgh mŸkj Nk¡Vuk gSA mŸkj dks OMR vkUlj&’khV esa
Answer-Sheet as per the direction : lEcfU/kr iz’u la[;k esa fuEu izdkj Hkjuk gS %
Example : mnkgj.k %
Question : iz’u %
Q. 1 iz’u 1
Q. 2 iz’u 2
Q. 3 iz’u 3
Illegible answers with cutting and viBuh; mŸkj ;k ,sls mŸkj ftUgsa dkVk ;k cnyk x;k
over-writing or half filled circle will be gS ;k xksys esa vk/kk Hkjdj fn;k x;k mUgsa fujLr dj
cancelled.
fn;k tk,xkA
5. Each question carries equal marks. Marks 5. izR;sd iz’u ds vad leku gSaA vkids ftrus mŸkj
will be awarded according to the number of lgh gksxa ]s mUgha ds vuqlkj vad iznku fd;s tk;saxAs
correct answers you have.
6. All answers are to be given on OMR Answer 6. lHkh mŸkj dsoy vks- ,e- vkj- mŸkj&i=d (OMR
sheet only. Answers given anywhere other Answer Sheet) ij gh fn;s tkus gSaA mŸkj&i=d esa
than the place specified in the answer sheet fu/kkZfjr LFkku ds vykok vU;= dgha ij fn;k x;k
will not be considered valid.
mŸkj ekU; ugha gksxkA
7. Before writing anything on the OMR Answer 7. vks- ,e- vkj- mŸkj&i=d (OMR Answer Sheet) ij
Sheet, all the instructions given in it should dqN Hkh fy[kus ls iwoZ mlesa fn;s x;s lHkh vuqns’kksa dks
be read carefully. lko/kkuhiwoZd i<+ fy;k tk;sA
8. After the completion of the examination 8. ijh{kk lekfIr ds mijkUr ijh{kkFkhZ d{k fujh{kd dks
candidates should leave the examination hall viuh OMR Answer Sheet miyC/k djkus ds ckn
only after providing their OMR Answer gh ijh{kk d{k ls izLFkku djsaA ijh{kkFkhZ vius lkFk
Sheet to the invigilator. Candidate can carry
their Question Booklet.
iz’u&iqfLrdk ys tk ldrs gSaA
9. There will be no negative marking. 9. fuxsfVo ekfd±x ugha gSA
10. Rough work, if any, should be done on the 10. dksbZ Hkh jQ dk;Z iz’u&iqfLrdk ds vUr esa jQ&dk;Z
blank pages provided for the purpose in the
booklet.
ds fy, fn, [kkyh ist ij gh fd;k tkuk pkfg,A
11. To bring and use of log-book, calculator, 11. ijh{kk&d{k esa ykWx&cqd] dSydqysVj] istj rFkk lsY;qyj
pager and cellular phone in examination hall Qksu ys tkuk rFkk mldk mi;ksx djuk oftZr gSA
is prohibited.
12. In case of any difference found in English 12. iz’u ds fgUnh ,oa vaxszth :ikUrj.k esa fHkUurk gksus dh
and Hindi version of the question, the n’kk esa iz’u dk vaxst
z h :ikUrj.k gh ekU; gksxkA
English version of the question will be held
authentic.
Impt. : On opening the question booklet, first egRoiw.kZ % iz’uiqfLrdk [kksyus ij izFker% tk¡p dj ns[k ysa
check that all the pages of the question fd iz’u&iqfLrdk ds lHkh i`”B HkyhHkk¡fr Nis gq, gSaA
booklet are printed properly. If there is ny ;fn iz’uiqfLrdk esa dksbZ deh gks] rks d{kfujh{kd dks
discrepancy in the question Booklet, then
after showing it to the invigilator, get
fn[kkdj mlh fljht dh nwljh iz’u&iqfLrdk izkIr
another question Booklet of the same series. dj ysaA

You might also like