0% found this document useful (0 votes)
11 views10 pages

11th Cs One Mark Reduced Syllabus Book Back Question & Answer Kaniniaram

The document is a syllabus for the academic year 2020-2021, containing book back questions and answers across various chapters related to computer science topics. It covers subjects such as computer organization, operating systems, Windows OS, algorithms, C++, data types, control flow, functions, and object-oriented programming. Each chapter includes multiple-choice questions designed to test knowledge on the respective topics.

Uploaded by

pooja161205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views10 pages

11th Cs One Mark Reduced Syllabus Book Back Question & Answer Kaniniaram

The document is a syllabus for the academic year 2020-2021, containing book back questions and answers across various chapters related to computer science topics. It covers subjects such as computer organization, operating systems, Windows OS, algorithms, C++, data types, control flow, functions, and object-oriented programming. Each chapter includes multiple-choice questions designed to test knowledge on the respective topics.

Uploaded by

pooja161205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SYLLABUS 2020 – 2021

BOOK BACK QUESTION AND ANSWER


ONE MARKS QUESTION AND ANSWER
CHAPTER 1

INTRODUCTION TO COMPUTERS

1. First generation computers used

(a)Vacuum tubes (b) Transistors (c) Integrated circuits (d) Microprocessors

10. Which generation of computer used IC’s?

(a) First (b) Second (c) Third (d) Fourth

CHAPTER 2

NUMBER SYSTEMS

1. Which refers to the number of bits processed by a computer’s CPU?

A) Byte B) Nibble C) Word length D) Bit

2. How many bytes does 1 Kilobyte contain?

A) 1000 B) 8 C) 4 D) 1024

4. 2^50 is referred as

A) Kilo B) Tera C) Peta D) Zetta

5. How many characters can be handled in Binary Coded Decimal System?

A) 64 B) 255 C) 256 D) 128

6. For 11012 what is the Hexadecimal equivalent?

A) F B) E C) D D) B

7. What is the 1‟s complement of 00100110?

A) 00100110 B) 11011001 C) 11010001 D) 00101001

8. Which amongst this is not an Octal number?

A) 645 B) 234 C) 876 D) 123

CHAPTER 3

COMPUTER ORGANIZATION

1. Which of the following is said to be the brain of a computer?

(a) Input devices (b) Output devices (c) Memory device (d) Microprocessor

2. Which of the following is not the part of a microprocessor unit?

(a) ALU (b) Control unit (c) Cache memory (d) register

PAGE NO 1
3. How many bits constitute a word?

(a) 8 (b) 16 (c) 32 (d) Determined by the processor used.

4. Which of the following device identifies the location when address is placed in the memory address
register?

(a) Locator (b) Encoder (c) Decoder (d) Multiplexer

5. Which of the following is a CISC processor?

(a) Intel P6 (b) AMD K6 (c) Pentium III (d) Pentium IV

6. Which is the fastest memory?

(a) Hard disk (b) Main memory (c) Cache memory (d) Blue-Ray disk

7. How many memory locations are identified by a processor with 8 bits address bus at a time?

(a) 28 (b) 1024 (c) 256 (d) 8000

8. What is the capacity of 12cm diameter DVD with single sided and single layer?

(a) 4.7 GB (b) 5.5 GB (c) 7.8GB (d) 2.2 GB

9. What is the smallest size of data represented in a CD?

(a) Blocks (b) Sectors (c) Pits (d) Tracks

CHAPTER 4

THEORETICAL CONCEPTS OF OPERATING SYSTEM

1. Operating system is a

a) Application Software b) Hardware c) System Software d) Component

2. Identify the usage of Operating Systems

a) Easy interaction between the human and computer b) Controlling input & output Devices

c) Managing use of main memory d) All the above

4. Which of the following OS is a commercially licensed Operating system?

a) Windows b) UBUNTU c) FEDORA d) REDHAT

5. Which of the following Operating systems support Mobile Devices?

a)Windows 7 b)Linux c) BOSS d) iOS

8. An example for single task operating system is

a) Linux b) Windows c) MS-DOS d) Unix

CHAPTER 5

WORKING WITH WINDOWS OPERATING SYSTEM

1. From the options given below, choose the operations managed by the operating system.

a. Memory b. Processes c. Disks and I/O devices d. All of the above

PAGE NO 2
2. Which is the default folder for many Windows Applications to save your file?

a. My Document b. My Pictures c. Documents and Settings d. My Computer

3. Under which of the following OS, the option Shift + Delete – permanently deletes a file or folder?

a. Windows 7 b. MS-DOS c. Linux d. Android OS

5. The shortcut key used to rename a file in windows

a. F2 b.F4 c.F5 d. F6

CHAPTER 6

SPECIFICATION AND ABSTRACTION

1. Which of the following activities is algorithmic in nature?

(a) Assemble a bicycle. (b) Describe a bicycle. (c) Label the parts of a bicycle.
(d) Explain how a bicycle works.

2. Which of the following activities is not algorithmic in nature?

(a) Multiply two numbers. (b) Draw a kolam. (c) Walk in the park. (d) Swapping of two numbers.

3. Omitting details inessential to the task and representing only the essential features of the task is known as
(a) Specification (b) abstraction (c) composition (d) decomposition

4. Stating the input property and the input-output relation a problem is known

(a) Specification (b) statement (c) algorithm (d) definition

5. Ensuring the input-output relation is

(a) The responsibility of the algorithm and the right of the user.

(b) The responsibility of the user and the right of the algorithm.

(c) The responsibility of the algorithm but not the right of the user.

(d) The responsibility of both the user and the algorithm.

6. If i = 5 before the assignment i := i-1 after the assignment, the value of i is

(a) 5 (b) 4 (c) 3 (d) 2

7. If 0 < i before the assignment i := i-1 after the assignment, we can conclude that

(a) 0 < i (b) 0 ≤ i (c) i = 0 (d) 0 ≥i

CHAPTER 7

COMPOSITION AND DECOMPOSITION

1. Suppose u, v = 10 ,5 before the assignment. What are the values of u and v after the sequence of
assignments?

1 u := v

2 v := u

(a) u, v = 5 ,5 (b) u, v = 5 ,10 (c) u, v = 10 ,5 (d) u, v = 10 ,10

2. Which of the following properties is true after the assignment at line 3?

PAGE NO 3
1 --i, j = 0, 0

2 i, j := i+1, j-1

3 -- ?

(a) i+j >0 (b) i+j < 0 (c) i+j =0 (d) i = j

3. If C1 is false and C2 is true, the compound statement

1 if C1

2 S1

3 else

4 if C2

5 S2

6 else

7 S3

Executes

(a) S1 (b) S2 (c) S3 (d) none

4. If C is false just before the loop, the control flows through

1 S1

2 while C

3 S2

4 S3

(a) S1 ; S3 (b) S1 ; S2 ; S3 (c)S1 ; S2 ; S2 ; S3 (d) S1 ; S2 ; S2 ; S2 ; S3

5. If C is true, S1 is executed in both the flowcharts, but S2 is executed in

(a) (1) only (b) (2) only (c) both (1) and (2) (d) neither (1) nor (2)

6. How many times the loop is iterated?

i := 0

while i ≠ 5

i := i + 1

(a) 4 (b) 5 (c) 6 (d) 0

CHAPTER 8

ITREATION AND RECURSION

PAGE NO 4
1. A loop invariant need not be true

(a) at the start of the loop. (b) at the start of each iteration

(c) at the end of each iteration (d) at the start of the algorithm

2. We wish to cover a chessboard with dominoes, the number of black squares and the number of white
squares covered by dominoes, respectively, placing a domino can be modeled by

(a) b := b + 2 (b) w := w + 2 (c) b, w := b+1, w+1 (d) b := w

3. If m x a + n x b is an invariant for the assignment a, b : = a + 8, b + 7, the values of m and n are

(a) m = 8, n = 7 (b) m = 7, n = -8 (c) m = 7, n = 8 (d) m = 8, n = -7

4. Which of the following is not an invariant of the assignment?

m, n := m+2, n+3

(a) m mod 2 (b) n mod 3 (c) 3 X m - 2 X n (d) 2 X m - 3 X n

CHAPTER 9

INTRODUCTION TO C++

1. Who developed C++?

(a) Charles Babbage (b) Bjarne Stroustrup (c) Bill Gates (d) Sundar Pichai

2. What was the original name given to C++?

(a) CPP (b) Advanced C (c) C with Classes (d) Class with

C 3. Who coined C++?

(a) Rick Mascitti (b) Rick Bjarne (c) Bill Gates (d) Dennis Ritchie

4. The smallest individual unit in a program is:

(a) Program (b) Algorithm (c) Flowchart (d) Tokens

5. Which of the following operator is extraction operator in C++?

(a) >> (b) << (c) <> (d) ^^

6. Which of the following statements is not true?

(a) Keywords are the reserved words which convey specific meaning to the C++ compiler.

(b) Reserved words or keywords can be used as an identifier name.

(c) An integer constant must have at least one digit without a decimal point.

(d) Exponent form of real constants consist of two parts

7. Which of the following is a valid string literal?

(a) ‘A’ (b) ‘Welcome’ (c) 1232 (d) “1232”

8. A program written in high level language is called as

(a) Object code (b) Source code (c) Executable code (d) All the above

9. Assume a=5, b=6; what will be result of a&b?

PAGE NO 5
(a) 4 (b) 5 (c) 1 (d) 0

10. Which of the following is called as compile time operators?

(a) sizeof (b) pointer (c) virtual (d) this

DATA TYPES, VARIABLES AND EXPRESSIONS

1. How many categories of data types are available in C++?

(a) 5 (b) 4 (c) 3 (d) 2

2. Which of the following data types is not a fundamental type?

(a) signed (b) int (c) float (d) char

3. What will be the result of following statement?

char ch= ‘B’;

cout << (int) ch;

(a) B (b) b (c) 65 (d) 66

4. Which of the character is used as suffix to indicate a floating point value?

(a) F (b) C (c) L (d) D

5. How many bytes of memory is allocated for the following variable declaration if you are using Dev C++?
short int x;

(a) 2 (b) 4 (c) 6 (d) 8

6. What is the output of the following snippet?

char ch = ‘A’;

ch = ch + 1;

(a) B (b) A1 (c) F (d) 1A

7. Which of the following is not a data type modifier?

(a) signed (b) int (c) long (d) short

8. Which of the following operator returns the size of the data type?

(a) sizeof( ) (b) int ( ) (c) long ( ) (d) double ( )

9. Which operator is used to access reference of a variable?

(a) $ (b) # (c) & (d) !

CHAPTER 10

FLOW OF CONTROL

1. What is the alternate name of null statement?

(A) No statement (B) Empty statement (C) Void statement (D) Zero statement

2. In C++, the group of statements should be enclosed within:

PAGE NO 6
(A) { } (B) [ ] (C) ( ) (D) < >

3. The set of statements that are executed again and again in iteration is called as:

(A) condition (B) loop (C) statement (D) body of loop

4. The multi way branch statement:

(A) if (B) if … else (C) switch (D) for

5. How many types of iteration statements?

(A) 2 (B) 3 (C) 4 (D) 5

6. How many times the following loop will execute?

for (int i=0; i<10;i++)

(A) 0 (B) 10 (C) 9 (D) 11

7. Which of the following is the exit control loop?

(A) for (B) while (C) do…while (D) if…else

8. Identify the odd one from the keywords of jump statements:

(A) break (B) switch (C) goto (D) continue

9. Which of the following is called entry control loop?

(A) do-while (B) for (C) while (D) if-else

10. A loop that contains another loop inside its body:

(A) Nested loop (B) Inner loop (C) Inline loop (D) Nesting of loop

CHAPTER 11

FUNCTIONS

3. Which function begins the program execution ?

A) isalpha() B) isdigit() C) main() D) islower()

4. Which of the following function is with a return value and without any argument ?

A) x=display(int, int) B) x=display() C) y=display(float) D) display(int)

5. Which is return data type of the function prototype of add(int, int); ?

A) int B) float C) char D) double

6. Which of the following is the scope operator ?

A) > B) & C) % D) ::

CHAPTER 12

ARRAYS AND STRUCTURES

1. Which of the following is the collection of variables of the same type that an referenced by a common
name ?

a) int b) float c) Array d) class

PAGE NO 7
2. int age[]={6,90,20,18,2}; How many elements are there in this array?

a) 2 b) 5 c) 6 d) 4

3. cin>>n[3]; To which element does this statement accept the value?

a) 2 b) 3 c) 4 d) 5

4. By default, a string ends with which character?

a)\0 b) \t c) \n d) \b

CHAPTER 13

INTRODUTION TO OBJECT ORIENTED PROGRAMMING TECHNIQUES

1. The term is used to describe a programming approach based on classes and objects is

(A) OOP (B) POP (C) ADT (D) SOP

5. The mechanism by which the data and functions are bound together into a single unit is known as

(A) Inheritance (B) Encapsulation (C) Polymorphism (D) Abstraction

6. Insulation of the data from direct access by the program is called as

(A) Data hiding (B) Encapsulation (C) Polymorphism (D) Abstraction

7. Which of the following concept encapsulate all the essential properties of the object that are to be
created?

(A) class (B) Encapsulation (C) Polymorphism (D) Abstraction

8. Which of the following is the most important advantage of inheritance?

(A) data hiding (B) code reusability (C) code modification (D) accessibility

9. “Write once and use it multiple time” can be achieved by

(A) redundancy (B) reusability (C) modification (D) composition

10. Which of the following supports the transitive nature of data?

(A) Inheritance (B) Encapsulation (C) Polymorphism (D) Abstraction

CHAPTER 14

CLASSES AND OBJECTS

1. The variables declared inside the class are known as data members and the functions are known as

(A) data function (B) inline functions (C) member functions (D) attributes

2. Which of the following statements about member functions are True or False?

i) A member function can call another member function directly with using the dot operator.

ii) Member function can access the private data of the class.

(A) i)True, ii)True (B) i)False, ii)True (C) i)True, ii)False (D) i)False, ii)False

3. A member function can call another member function directly, without using the dot operator called as

(A) sub function (B) sub member (C) nesting of member function (D) sibling of member function

PAGE NO 8
4. The member function defined within the class behave like ........ functions

(A) inline (B) Non inline (C) Outline (D) Data

5. Which of the following access specifier protects data from inadvertent modifications?

A) Private (B) Protected (C) Public (D) Global

6. class x

int y;

public:

x(int z)

{ y=z; }

} x1[4];

int main()

x x2(10);

return 0;

How many objects are created for the above program

(A) 10 (B) 14 (C) 5 (D) 2

CHAPTER 15

POLYMORPHISM

1. Which of the following refers to a function having more than one distinct meaning?

(A) Function Overloading (B) Member overloading

(C) Operator overloading (D) Operations overloading

2. Which of the following reduces the number of comparisons in a program ?

(A) Operator overloading (B) Operations overloading (C) Function Overloading (D) Member overloading

3. void dispchar(char ch=’$’,int size=10)

for(int i=1;i<=size;i++)

cout<<ch;

How will you invoke the function dispchar() for the following input?

To print $ for 10 times


PAGE NO 9
(A) dispchar(); (B) dispchar(ch,size); (C) dispchar($,10); (D)dispchar(„$‟,10 times);

4. Which of the following is not true with respect to function overloading?

(A) The overloaded functions must differ in their signature.

(B) The return type is also considered for overloading a function.

(C) The default arguments of overloaded functions are not considered for Overloading.

(D) Destructor function cannot be overloaded.

5. Which of the following is invalid prototype for function overloading

a) void fun (int x); b) void fun (intx);

void fun (char ch); void fun (inty);

c) void fun (double d); d) void fun (double d);

void fun (char ch); void fun (inty);

CHAPTER 16

INHERITANCE

1. Which of the following is the process of creating new classes from an existing class

(a) Polymorphism (b) Inheritance (c) Encapsulation (d) super class

2. Which of the following derives a class student from the base class school

(a) school: student (b) class student : public school

(c) student : public school (d) class school : public student

3. The type of inheritance that reflects the transitive nature is

(A) Single Inheritance (B) Multiple Inheritance (C) Multilevel Inheritance (D) Hybrid Inheritance

5. Inheritance is a process of creating new class from

(A) Base class (B) abstract (C) derived class (D) Function

6. A class is derived from a class which is a derived class itself, then this is referred to as

(A) multiple inheritance (B) multilevel inheritance (C) single inheritance (D) double inheritance

CHAPTER 17

COMPUTERS ETHICS AND CYBER SECURITY

1. Which of the following deals with procedures, practices and values?

a. piracy b. programs c. virus d. computer ethics

2. Commercial programs made available to the public illegally are known as

a. freeware b. warez c. free software d. software

CHAPTER 18

TAMIL COMPUTING

------NIL------

PAGE NO 10

You might also like