0% found this document useful (0 votes)
73 views

STD 12 EM MCQs

Uploaded by

Dhyey Pansuriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

STD 12 EM MCQs

Uploaded by

Dhyey Pansuriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

Mahesh Sir - 9724665284 PAGE NO: 1 App : Clear Code Technical Technical

40

INDEX
Page
No CHAPTERS
No.
1. Creating HTML Form using KompoZer 4
2. Cascading Style sheets and Java script 15
3. Designing Simple website using Kompozer 25
4. Introduction to E-Commerce 31
5. Introduction to M-Commerce 41
6. Object – Oriented Concepts 57
7. Java Basics 66
8. Classes and Objects in Java 75
9. Working with Array and String 79
10. Exception Handling 85
11. File Handling 92
12. Publishing document using LaTeX 100
13. Other useful free tools and services 110
ANSWERS……………

Mahesh Sir - 9724665284 PAGE NO: 2 App : Clear Code Technical Technical
Marks
No CHAPTERS Marks
1. Creating HTML Form using KompoZer 8
2. Cascading Style sheets and Java script 10
3. Designing Simple website using Kompozer 8
4. Introduction to E-Commerce 7
5. Introduction to M-Commerce 6
6. Object – Oriented Concepts 8
7. Java Basics 10
8. Classes and Objects in Java 10
9. Working with Array and String 10
10. Exception Handling 6
11. File Handling 6
12. Publishing document using LaTeX 6
13. Other useful free tools and services 5
TOTAL MARKS 100

Mahesh Sir - 9724665284 PAGE NO: 3 App : Clear Code Technical Technical
Creating HTML Forms Using KompoZer
Total Marks : 8
(1). What is used to fill information about various products?
(A) Server page (B) Home page (C) Web (D)Master Page
(2). Which is well organized structure designed to input the required data and information of website is called?
(A) Required information are filled in the form
(B) Well organized input of information is done using form
(C) Form contains well organized structured.
(D) None of them
(3). The method of adding information in the form of the webpage is similar to which type of form?
(A) Printed form (B) hand written form (C) Online form (D) Offline form
(4). What is Form ?
(A) Source Code (B) Container (C) Object (D) Editor
(5). Which of the following element does the form contain ?
(A)Label ,check box (B) Text input field ,Radio button
(C)Submittbutton,Reset button (D) All of these
(6). Using which of the following a form can be designed easily ?
(A) HTML (B) WordPad (C) XML (D) Form liner
(7). How many parts are elements fo form divided into ?
(A) Two (B) Three (C) Four (D) Five
(8). Which container is used to collect different kinds of inputs form the user?
(A) Table (B) Form (C)Rport (D) Query
(9). What acts a container for all the elements used in the form ?
(A) Table (B) Report (C) Form (D) Frame
(10). How many attributes does form tag have?
(A) Two (B) Three (C) Four (D) Five
(11). Which attribute of form element is used to spcify where to send the form data when the form is submitted ?
(A) Method (B) action (C)(A)or(B) (D) None of these
(12). What does action attribute take as value?
(A) Website name (B) Name of webserver (C) File name (D) Name of folder
(13). Which attribute of form element specifies the HTTP method to be used when sending the data ?
(A)action (B) method (C)(A) Or (B) (D) None of these
(14). Which attribute decides how to submit the information of form on specified address ?
(A)method (B) Action (C)(A) or(B) (D) None of these
(15). Which values can method attribute of form element take ?
(A)HTML ,http (B)get,post (C)action,method (D) Any of these
(16). Which value of method attribute adds the retrieved data from the form to the end of URL and sends to the
server ?
(A)post (B) get (C) action (D) All of these
(17). Which of the following shows the use of action attribute?
(A) To specify the address where the information has to be sent when form is submitted
(B) To specify the specification of HTTP
(C) Both (A) and (B)
(D)None of these
(18). Which value of method attribute provides facility of sending unlimited information at one time ?
(A)post (B) get (C) action (D) All of these
(19). Which of the following specifies the use of method attribute?
(A) Specifies the address where the information has to be sent after submitting the form
(B)specifies the HTTP method
(C) Both (A) or(B) (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 4 App : Clear Code Technical Technical
(20). Which value of method attribute does not have any restriction of length of information?
(A)post (B) get (C) action (D) All of these
(21). Which of the given below is an example of Input element ?
(B)Text box, password (B) Radio button,Check box
(C) Submit button ,Reset button (D) All of these
(22). Which attribute is used along with <input>tag ?
(A)type (B) name (C) value (D) All of these
(23). What is the use of type attribute?
(A) To specify the field that is to be created (B) To specify the name to be used for the field
(C)to specify the default value of the field (D) None of these
(24). What is the use of name attribute?
(A) To specify the field that is to be created (B) To specify the name to be used for the field
(C) To spcify the default value of the field (D) All of these
(25). What is the use of value attribute?
(A) To specify the field that is to be created (B) To specify the name to be used for the field
(C) To specify the default value of the field (D) All of these
(26). Which input element is used to enter text in the form?
(A) Password (B) Text box (C) Radio button (D) check box
(27). Which element is used to create text box in form ?
(A)text (B) box (C) textbox (D)textline
(28). What is the syntax of creating texbox in the textbox in the form?
(A)<input type= text name=var value=txt> (B)<input type=”text” name=”var” value=”txt”>
(C)<input type=”text”name=”var” value=txt> (D) {<input type=”text”name=”var” value=”txt”>}
(29). Password field is similar to which of the following?
(A) Drop down menu (B) Text box (C) Radio button (D) Check box
(30). In Which of the following the characters typed are converted into non readable format?
(A)password (B) text box (C) Radio Button (D) All of these
(31). Which of the following dose not let any one read the typed text when user does login?
(A) Password (B) Text box (C) Radio button (D) check box
(32). What is used to select only one option from the given many option from the given many options in the form?
(A) Radio button (B) Check box (C) Text box (D) password
(33). How many radio buttions can be selected from many radio buttons available in a single group ?
(A) 1 (B) 2 (C) 3 (D) 4
(34). What is the shape of radio button ?
(A) Circle (B) Square (C) Triangle (D) Rectangle
(35). When one radio button is selected than that happens to the other radio buttons of the same group ?
(A) Active (B) Deactivate (C) Special (D) Normal
(36). Which attribute is used to display a radio button selected by default ?
(A) Check (B) Select (C) Checked (D) selected
(37). What is the syntax of creating radio button in the form ?
(A)<input=”radio”name=”var” value=”txt”>
(B)<input=”radio”name=”var” type=”txt”>
(C)<input=”radio”type=”var” value=”txt”>
(D)<input type=”radio”name=”var” value=”txt”>
(38). Which element is used to create check box field in form ?
(A)check box (B) check_ box (C) box (D) box_ check
(39). What is the shape of check box ?
(A) Circle (B) Square (C) Triangle (D) Rectangle
(40). What is used to select a more than one item from a given group of item ?
(A) Radio button (B) check box (C) Text box (D) Password
(41). What is true from the following for the checked attribute of check box ?
(A) Compulsory (B) Optional (C) Sometimes compulsory (D) sometimes optional
(42). Which button is used to send the values of data entered in the form?
(A) Send Button (B) Enter Button (C) Submit Button (D) Reset Button

Mahesh Sir - 9724665284 PAGE NO: 5 App : Clear Code Technical Technical
(43). On clicking which button, the values of data entered in the form is submitted to the file specified in the action
attribute of the form element ?
(A)Enter Button (B) Send Button
(C) Reset Button (D) Submit Button
(44). On clicking which button, the values of data entered in the form are cleared and set back to default values?
(A)Send Button (B) Enter Button
(C) Submit Button (D) Reset Button
(45). The values of data entered in the form are set to which values when reset button is clicked ?
(A) Set back to default value (B) Null
(C) New (D) old
(46). Which element allows multiline text input in form ?
(A) Text box (B) Text area (C) Text Line (D) Text Object
(47). How many characters can be entered in text area element ?
(A)50 (B) 64 (C) 255 (D) Unlimited
(48). Which element is used to enter comment Report ,Long description ?
(A) Text box (B) Text area (C) Radio Button (D) Drop Down Menu
(49). Which attribute is used to set the number of rows of text that will be visible without scrolling up or down?
(A)row (B) rows (C) col (D) cols
(50). Which of the following specifies the correct code to create text area element ?
(A)<textarea name=”comments” rows =”5”cols=”20”>Your comments here</textarea>
(B)<textarea name=”comments” rows =”5”col=”20”>Your comments here</textarea>
(C)<textarea type=”comments” rows =”5”cols=”20”>Your comments here</textarea>
(D)<textarea type=”comments” rows =”5”col=”20”>Your comments here</textarea>
(51). What is used when displaying all the options on the screen is not required ?
(A) Radio Button (B) Dropdown Menu (C) Check box (D) Text area
(52). Which element is used to specify the values that are to be displayed in the menu ?
(A)<select> (B)<list> (C)<option> (D)<value>
(53). Which attribute is used to display specific option to be selected by default ?
(A)Check (B) Select (C) checked (D) selected
(54). Form can be created easily with which of the following ?
(A) IED (B) ILD (C) IDE (D) IDL
(55). What is IDE?
(A) Software Application (B) Hardware application
(C) Database (D) Source code
(56). Which facility is provided for integrated Development Environment (IDE) from the following?
(A)GUI (Graphical user Interface) (B) Text /Code editor
(C) Compiler/interpreter, Debugger (D) All of these
(57). Which is the example of open source IDE from the following ?
(A)Kompozer (B) Eclipse (C)JBuilder,Netbeans (D) All of these
(58). Form which website can KompoZer be downloaded ?
(A)http://www.kompoZer.com (B)http://www.KompoZer.net
(C)http://www.kompoZer.co.in (D) http://www.kompoZer.org
(59). What is full form of WYSIWYG?
(A) What You Saw Is What You Get (B) What You Say Is What You Get
(C) What You See Is What You Get (D) What You Said Is What You Get
(60). Which type of software is KompoZer?
(A) Web Source System (B) Web Database System
(C) Web Authoring System (D) Web Development System
(61). How can a webpage be created using kompoZer?
(A) Easy (B) Quick (C)Both(A) and (B) (D) Difficult
(62). In KompoZer, Who gives rapid access to the files on both local machines and remote servers?
(A) Site Manger (B) Server Manager (C) Source Code Manager (D) Section Manger
(63). What can be done to the webpages and associated files on a remote server from within kompoZer?
(A) Download (B) Upload (C)Both(A)and(B) (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 6 App : Clear Code Technical Technical
(64). What is the full form of CSS?
(A)Cascading Section Sheet (B) Cascading Sheet Style
(C) Cascading Sheet Section (D) Cascading Style Sheet
(65). Under which option is KomoZerdisplayed ?
(A) Accessories (B) Office (C) Programming (D) Graphics
(66). Which option is listed in show /Hide option of View menu in KompoZer?
(A) Composition Toolbar ,Edit Mode Toolbar
(B) Format Toolbar 1,Format Toolbar 2
(C) Status Bar, Sidebar (Site Manger ),Rulers
(D) All of these
(67). Which format toolbars are available in KompoZer?
(A) Format Toolbar A,Format Toolbar B (B) Format Toolbar I,Format Toolbar II
(C) Format Toolbar 1,Format Toolbar 2 (D) Format Toolbar I ,Format Toolbar ii
(68). Which menus are displayed in the menubar of KompoZer?
(A)File,Edit,View (B) Insert, Format, Table (C)Tools,Help (D) All of these
(69). Which toolbars are displayed below menubar?
(A)Composition Toolbar (B) Format Toolbar 1
(C) Format Toolbar 2 (D) All of these
(70). What is the use of Format Toolbar1 and Format Toolbar 2 ?
(A)Format the text (B) Add bullets and numbering
(C) Similar formation option (D) All of these
(71). In KompoZer Which toolbar is used to format the text ,add bullets and numbering and perform sililar
formatting operations ?
(A) Composition Toolbar (B) Format Toolbar1, Format Toolbar2
(C)Both(A) And(B) (D) Edit Mode Toolbar
(72). Which panes are displayed in the center of the kompoZer window?
(A) Site Manger (B) page pane (C)Both(A) and(B) (D) page tab
(73). Which button is used to close site manager?
(A) Exit Button (B) End Button (C) Close Button (D) Leave Button
(74). In KompoZer, What does page pane show?
(A)Blank Webpage (B) Blank untitled webpage (C) Web page named untitled (D) All of these
(75). How many modes are there in Edit mode toolbar?
(A) Two (B) Three (C) Four (D) Five
(76). Which facility is provided by Normal HTML Tags and preview mode of Edit mode?
(A)Editing (B) Decoration (C) Insertion (D) Help
(77). Normal mode is similar to which mode?
(A) HTML Tags (B) preview (C) Both (A)and(B) (D) None of these
(78). Which color marker is used to indicate the start tag for all elements?
(A) Red (B) Yellow (C) Green (D) Blue
(79). Which mode of Edit mode toolbar is used to display the page view as seen in a browser?
(A) Normal (B)HtMLtages (C) preview (D) All of these
(80). Form the given modes below in which mode links do not operate?
(A) Normal (B) HTML Tags (C) Preview (D) All of these
(81). How many tabs are displayed on the left side of the page pane?
(A) Three (B) Four (C) five (D) Six
(82). Which tab is used to design the webpage?
(A)Design (B) Split (C) Source (D) All of these
(83). Which tab shows all details of the HTML code?
(A) Design (B) Split (C) Source (D) Any of these
(84). What is seen in the bottom of the window?
(A) Site Manager (B) Status bar (C) Page Tab (D) Composition Toolbar
(85). To customize any toolbar,right click on the respective toolbar and click on which option?
(A) Customize toolbar (B) Format Toolbar
(C) Change Toolbar (D) Edit Toolbar

Mahesh Sir - 9724665284 PAGE NO: 7 App : Clear Code Technical Technical
(86). In KompoZer ,Newtoolbutton is located on which toolbar?
(A) Composition Toolbar (B) Edit Mode Toolbar
(C) Format Toolbar-1 (D) Format Toolbar -2
(87). How many options are displayed in create a new document or template dialog box in KompoZer?
(A) Two (B) Three (C) Four (D) Five
(88). Which options of Create a new document or template dialog box should be selected to create new file in
KompoZer?
(A) A blank document (B) A new document based on a template
(C) A blank template (D) Any of these
(89). Which options are displayed beneath Setting of Form properties dialog box?
(A)Form Name (B) Action URL (C) Method (D) Any of these
(90). In Which option of Form properties dialog box is the name of file entered where the form data has to be
submitted?
(A) Form Name (B) Action URL (C) Method (D) Any of these
(91). On clicking OK button after entering all details in Form properties dialog box, what is the form named by
default?
(A) Untitled (B) New (C) Form (D) Document
(92). In KompoZer , in Normal view , the forms are shown surrounded by which colored dotted box?
(A)black (B) Blue (C) Red (D)Green
(93). Which key is pressed to make space for work in dotted blue box surrounding form for work?
(A) Enter key (B) Control Key
(C) page up/Page Down key (D) Insert key
(94). What should be placed where form label should apperar?
(A) Pointer (B) Cursor (C) arrow key (D) Tab key
(95). In KompoZer,which menu-option is used to create a input text field in form?
(A)view --> Form --> form field (B) Insert --> Form --> Form Field
(C) Format --> form --> form field (D)Form --> Insert --> Form field
(96). Which properties are displayed when more properties options of form field properties dialog box clicked?
(A) Field Size (B) Maximum length (C)Both(A) and (B) (D) None of these
(97). The value of field size and Maximum length properties of textbox are given under which properties?
(A)Text box properties (B) Field properties
(C) Master properties (D) fewer properties
(98). To preview the form preview toolbutton of which toolbar should be clicked?
(A) Edit Mode Toolbar (B)Composiition Toolbar (C) Format Toolbar 1 (D) Format Toolbar 2
(99). Which tab of kompoZer can be clicked to see the source code of the form?
(A) Design (B) Source (C) Split (D) Any of these
(100). Which dialog box opens when save toolbutton is clicked in KompoZer?
(A) Page Title (B) Form Title (C)save (D) Save As
(101). Where is the page title of webpage displayed ?
(A) Title bar (B) Menu bar (C) Toolbar (D) Status bar
(102). What is displayed when OK button of page Title dialog box of File save option clicked?
(A) Dialog box of Save (B) Dialog box of save As
(C) Dialog box of save page As (D) Dialog box of page As
(103). With which name shall the page be saved when that page is the home page that will open when you type the
website’s URL?
(A)master.html (B) home.html (C) main.html (D) index.html
(104). How many types of headings are available in paragraph format of Format Toolbar?
(A) Four (B) Five (C) Six (D) Seven
(105). How many types of alignment for text are available on format toolbar?
(A) Two (B) Three (C) Four (D) Five
(106). Which type of field is useful when only one option from the given options is to be selected?
(A) Radio button (B) check box (C) Text Area (D) (A) or (B)
(107). Which option should be selected when a radio button should appear selected by default?
(A) Group Name (B) Field Value (C) Initially Selected (D) Initially Checked

Mahesh Sir - 9724665284 PAGE NO: 8 App : Clear Code Technical Technical
(108). Which type of field is useful when one or more than one options from the given options are to be selected?
(A) Radio Button (B) Check Box (C) Text Area (D) (A) or (B)
(109). Which type of field is used to insert multiline textbox?
(A) Radio Button (B) Check Box (C) Text Area (D) (A) or (B)
(110). Where is the text written which should be displayed by default in text area field ?
(A) Field Name (B) Initial Text (C) Rows (D) Columns
(111). What should be used when it is not necessary to display all options at a time on the screen ?
(A) Radio Button (B)Check box (C) Drop Down Menu (D) Text area
(112). Which buttons are displayed in Selection List properties dialog box?
(A)Add option, Add Group (B) Remove, Advanced Edit
(C) Move Up, Move Down (D) All of these
(113). What is by default background color of form in KompoZer?
(A)Red (B) Yellow (C) Light Blue (D) White
(114). Which option should be selected in page colors and background dialog box to background dialog box?
(A) Reader’s default Colors (B) Use custom Colors
(C) Background (D) Any of these
(115). Which value should be given to type attribute of input element to create textbox in form?
(A) Input (B) Text (C) textual (D) None of these
(116). Which value should be given to type attribute of input element to create radio button in form?
(A) Input (B) radio (C)button_radio (D) redio
(117). Whose increase in the use has resulted in many activities becoming online?
(A)Internet (B)Mobile (C) GPS (D)Social Networking
(118). What is used to help the visitors of the website to input data?
(A) Table (B) Form (C) Database (D) File
(119). Which of the following option is true with respect form?
(A)Required information are filled in the form
(B) well organized input of information is done using form
(C)form contains well organized structure
(D) All of these
(120). What does the form allow?
(A) Interactivity (B) Control in data entry (C) Both (A) and (B) (D) None of these
(121). Form the list given below ,what is used to collect different kinds of inputs form the user ?
(A) Table (B) Report (C) Form (D) Query
(122). What is use of various element of form?
(A) Enter the data (B) Validate the data (C)Both(A)and(B) (D) None of these
(123). What is the full form of Html ?
(A)Hyper Text Mange language (B) Hyper Text Markup language
(C) Hyper Text marker language (D) Hyper Text marking language
(124). Which form the given below are the elements of form ?
(A)Form Input (B) Text area (C) Select and Option (D) All of these
(125). Which element is used to create an HTML Form ?
(A)form (B)Frm (C)frmsrc (D)Formset
(126). Which tag is used to implement various elements of form?
(A)<form>…<\form> (B)<form>…</form>
(C)<\form>…<\form> (D)</form>..</form>
(127). Which of the given below are the attributes of the form tag ?
(A) Action (B) Method (C) Both (A)and(B) (D) None of these
(128). Which attribute of <form> tag is used to control the processes executing after the form is submitted ?
(A)method (B) action (C)(A)or(B) (D) None of these
(129). After filling the data in the form ,the file the user clicks on which button?
(A)finish button (B) OK button (C) Reset button (D) Submit button
(130). What is the full form of HTTP?
(A) Hyper Text Taged Protocol (B) Hyper Text Timeline Protocol
(C) Hyper Text Transfer Protocol (D) Hyper Text Terminal Protocol

Mahesh Sir - 9724665284 PAGE NO: 9 App : Clear Code Technical Technical
(131). How many values can method attribute of form element take ?
(A) Two (B) Three (C) Four (D) Five
(132). Which is the default value of method attribute of form element ?
(A)get (B) post (C) action (D) All of these
(133). What is the full form of URL ?
(A) Uniform Redefine Locator (B) Uniform Rearrange Locator
(C) Uniform Reform Locator (D) Uniform Resource Locator
(134). Which value of method attribute provides facility of sending limited information of one time ?
(A)get (B) post (C) action (D)(A) or (B)
(135). Which of the following term provides facility of sending information in form of blocks using HTTP
transaction?
(A)get (B) action (C) post (D) Any of these
(136). Which value of method attribute sends information in the form of request?
(A)get (B) post (C) action (D)(A)or (B)
(137). Which element are used in form?
(A) Input objects (B)OutPut objects (C) process objects (D) All of these
(138). Which tag is used to implement input element in the form?
(A)<input> (B)<input>…</input> (C)<A> or<B> (D) None of these
(139). Which attribute of the input element specified the field the Is to be created in the form?
(A)type (B) name (C) value (D) None of these
(140). Which attribute of the input element specifies the name to be used for the field in the form?
(A)type (B) name (C) value (D) Any of these
(141). Which attribute of the input element specified the default value of the field in the form?
(A)type (B) name (C) value (D) Any of these
(142). Which are the various input elements that can be created using type attribute of <input>tag ?
(A)Submit button ,reset button (B) Text box
(C) Radio Button check box ,drop down menu (D) All of these
(143). Form the given options below ,what is the textbox used for?
(A)Title of the webpage (B) users name
(C) E-mail address (D) All of these
(144). Which type of data can be entered in the textbox?
(A)Text (B) Numeric (C) Symbolic (D) All of these
(145). Which element is used to create password field in form?
(A)password (B)Text box (C) Radio button (D) Check box
(146). Characters are not displayed to the user in which of the following?
(A)Radio button (B) Check box (C) Text box (D) Password
(147). In Which form are the characters typed in the password field displayed?
(A)dots (B)asterick (C) square (D) All of these
(148). What is the syntax of creating password box in the form?
(A)<input =”password” name=”var”> (B)<input value =”password” name=”var”>
(C)<input type =”password” name=”var”> (D)<input type =”password” value=”var”>
(149). Which element is used to create radio button in form ?
(A)button (B) radio (C)button_radio (D)radio_button
(150). It is possible to select more than one radio button .select correct option for this statement?
(A) This statement is true (B) This statement is false
(C) We cannot be sure of this statment (D)None of these
(151). What appears in the circle of radio button which is selected?
(A) Line (B) Arrow (C) Dot (D) Tick
(152). Generally what is used to select a single item from a given group of item?
(A) Radio button (B) Check box (C) Text Box (D) Password
(153). What is true from the following for the checked attribute of radio button ?
(A) Compulsory (B) Optional (C)Sometimes compulsory (D)Sometimes optional
(154). What is used to select only one option from the given many options in the form ?
(A) Radio button (B)Check_box (C)Text box (D) password

Mahesh Sir - 9724665284 PAGE NO: 10 App : Clear Code Technical Technical
(155). It is possible to select more than one check box, select correct option for this statement ?
(A) This statement is true (B) This statement is false
(C) We cannot be sure of this statement (D)None of these
(156). What appears in the square of check box which is selected ?
(A)Line (B) Arrow (C) Dot (D) Tick
(157). Which attribute is used to display a check box selected by default?
(A)check (B) select (C) checked (D) selected
(158). What is the syntax of creating check box in the form?
(A)<input type = “checkbox” name= “var” value=”txt”>
(B)<input name = “checkbox” name= “var”value=”txt”>
(C)<input type = “checkbox” type= “var”name=”txt”>
(D)<input type = “checkbox” value= “var”value=”txt”>
(159). Which button is used to send the values of data entered in the form to the server?
(A) Reset Button (B) Submit Button (C) Enter Button (D) Send Button
(160). What is the syntax of creating submit button in the form?
(A)<input type=”submit” value=”label”>
(B)<input=”submit” value=”label”
(C)<input value=”submit” type=”label”>
(D)<input name=”submit” value=”label”>
(161). What is the use of reset button?
(A) Replace the data values entered in the form by its default values
(B) Replace the data values entered in the form by blank spaces.
(C)(A) or (B)
(D)to change all the values filled in the form with the values present on the web server
(162). What happens when reset button is clicked ?
(A) The values of data entered in the form are cleared
(B) The values of data entered in the form are set back to default values
(C) Both (A)and(B)
(D) The values of data entered in the form can be modified
(163). Which element is used to implement text area element ?
(A)<textarea>…..</textarea> (B)<text>…..(/text>
(C)</textarea>…..(/textarea) (D)</text>>…..(text>
(164). To enter which type of data from the following is text area element used?
(A)Comment (B) Report (C) Long description (D) All of these
(165). Which attribute is used to specify size of text area element ?
(A) Rows (B)Cols (C)Both(A)and(B) (D) Row And Col
(166). Which attribute is used to set the number of columns of text that will be visible without scrolling right or left ?
(A)row (B) rows (C) col (D) cols
(167). Which tag is used to create drop down menu in the form ?
(A)dropdown (B)pulldown (C) select (D) list
(168). Which tag is used to create a dropdown menu ?
(A)<option></option> (B)<dropdown>..</dropdown>
(C)<list></list> (D)<select>..</select>
(169). Which tag is used to create the elements within the menu ?
(A)<option>..</option> (B)<dropdown></dropdown>
(C)<list>…</list> (D)<select>….</select>
(170). How is designing a form using HTML tags ?
(A) Tedious (B) Very Easy (C) Motivating (D) All of these
(171). What is the full form of IDE?
(A) Integrated Database Environment (B) Integrated Development Environment
(C) Integrated Document Environment (D) Integrated Declaration Environment
(172). What is true for Integrated Development Environment (IDE)from the following ?
(A) It provides facility to make form easily (B) It is software application
(C) It provides facility to programmers to make software (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 11 App : Clear Code Technical Technical
(173). What is full form of GUI?
(A) Graphical User Interface (B) Graphical Useful Interface
(C) Graphical Useful Integration (D) Graphical Universal Interface
(174). Which option is true for KompoZer ?
(A)It is IDE software for wed development (B) It is free of cost
(C)It is open source (D) All of these
(175). What is a simple graphical interface which provides webpage editor in KompoZer?
(A) WYSIWYG (B) WYSIWGY (C) WYSIYGW (D) WYSIYWG
(176). How is “what You see Is what You Get (WYSIWYG)” interface?
(A) What you can see ,the same you get in the result
(B) You can see and also modification can be done
(C) In it you can see the result and similar insertion can be done
(D)None of these
(177). What does kompozer integrate?
(A)Web page developement (B) Web file management
(C) Web server development (D) Both (A) and (B)
(178). What is used by user to edit a webpage?
(A) Database (B) Source Code (C) Master File (D) Master code
(179). In KompoZer ,Site Manger gives rapid access to the files located on which servers?
(A) Local (B) Remote (C) Both (A) and (B) (D) None of these
(180). What is used to support styles in KompoZer?
(A) CSS (B) CSC (C) SCC (D) SCS
(181). Which menu option is used to open KompoZer?
(A)Application Programming KompoZer (B) Application Program KompoZer
(C) Application Place KompoZer (D) Application System KompoZer
(182). Which menu –option is KompoZer displayed?
(A)showshow/Hide (B) View Show/Hide
(C)DisplayShow/Hide (D) Format Show/Hide
(183). How many format toolbars are there in KompoZer?
(A) Two (B) Three (C) Four (D) Five
(184). How many menus are displayed in the menubar of KompoZer?
(A) Six (B) Seven (C) Eight (D) Nine
(185). How many toolbars are displayed below menubar?
(A) Two (B) Three (C) Four (D) Five
(186). What is the use of composition toolbar?
(A) To create a new file and save it (B) open of File (C) Publish a website (D) All of these
(187). In KompoZer Which Toolbar is used to create new file ,open a file, save a file and publish website?
(A) Composition Toolbar (B) Format Toolbar 1,Format Toolbar 2
(C) Both (A) and(B ) (D) Edit mode Toolbar
(188). How many panes are displayed in the centre of the kompoZer window?
(A) Two (B) There (C) Four (D) Five
(189). In KompoZer,which pane is a powerful tool used to navigate within the site or between the sites?
(A) Site Manger (B) page pane (C)Both(A)And (B) (D) Page tab
(190). Which key is used to close site manager?
(A)Function key F6 (B) Function key F7 (C) Function key F8 (D) Function key F9
(191). Which toolbar is shown at the bottom right side of the page pane window?
(A)Edit mode Toolbar (B) Format Toolbar1, Format Toolbar2
(C) Composition Toolbar (D) All of these
(192). Which modes are there in Edit mode toolbar?
(A)Normal (B) HTML Tages (C)Perview (D) All of these
(193). Which mode of Edit mode toolbar is used to display webpage along with its table outlines?
(A) Normal (B) HTML Tags (C) Preview (D) All of these
(194). Which mode of Edit mode toolbar is useful for those who are familiar with HTML?
(A)Preview (B) Normal (C) HTML Tags (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 12 App : Clear Code Technical Technical
(195). What happens on clicking the yellow marker which indicates the start tag for all elements?
(A) Select and highlights whole of the elements
(B) Select and highlights whole sub elements
(C) Select and highlights program of the elements
(D) Select and highlights function of the elements
(196). Form the given modes below in which mode the script do not run and therefore their effects will not be seen?
(A) Preview (B) Normal (C) HTML Tags (D) All of these
(197). In KompoZer,whatdose it display?
(A) page tab (B) Edit mode Toolbar (C) Site Manager (D) Composition Toolbar
(198). Which tab is displayed on the left side of the page pane?
(A)Design (B) Split (C) Source (D) All of these
(199). Which tab displays the HTML Source of the Current element?
(A) Design (B) Split (C) Source (D) All of these
(200). Which tab helps in editing the source code?
(A) Design (B) Split (C) Source (D) Any of these
(201). When any item in page is clicked, where does its structure appear?
(A)page Tab (B) Page Area (C) Site Manager (D) Status Bar
(202). In KompoZer ,Which menu-option is used to create a new file?
(A) File --> New (B) Compose -->New (C) Application -->New (D) Define--> New
(203). Which dialog box appears when file -->New option is selected in kompoZer?
(A) Create a new document (B) Create a new template
(C) Create a new document or template (D) Create a document or template
(204). Which options are displayed in create a new document or template dialog box in kompoZer?
(A)A blank document (B) A new document based on a template
(C) A blank template (D) All of these
(205). Which option of Form properties dialog box shows added options for the form when clicked?
(A) More properties (B) Extra properties (C) View properties (D) Add properties
(206). In Which option if form name typed in form properties dialog box?
(A) Form Name (B) Action URL (C) Method (D) Any of these
(207). In which option of Form properties dialog box can GET or POST method selected?
(A) Form Name (B) Action URL (C) Method (D) Any of these
(208). In KompoZer a form is with which color outline by default?
(A) Light Red (B) Light Green (C) Light Yellow (D) Light Blue
(209). What can be placed in the form surrounded by dotted blue box?
(A)Text,Box,Text area (B) Radio Button, Check box, Drop Down menu
(C) Submit button,Reset Button (D) All of these
(210). In KompoZer, which menu-option is used to create a form label?
(A) Format --> Form --> Define Label (B) Form --> Form --> Define Label
(C) Insert --> Form --> Define Label (D) View --> form --> Define Label
(211). Where should it be clicked to come out of the label field?
(A)outside field ,above or below it (B)out side ,on left or right side
(C) Any place outside field ` (D) on the field
(212). Which input field type options are displayed in field type drop down menu of form field properties dialog
box?
(A) Text password check Box Radio Button (B) Submit Button,Reset Button, Button
(C) File, Hidden, Image (D) All of these
(213). Which option of form field properties dialog box should be used to show some text before the user actually
enters data?
(A)Initial Value (B) Default value (C) Display Value (D) Form Value
(214). What should be the value of field value to insert submit button in the form?
(A)submit (B) Button (C) Add (D) Send
(215). Which program relieves a programmer from the tedious job of writing the source code which takes a long
time?
(A) HTML (B) JavaScript (C)KompoZer (D)All of these

Mahesh Sir - 9724665284 PAGE NO: 13 App : Clear Code Technical Technical
(216). In KompoZer Save tool button is located on which toolbar?
(A) Edit mode Toolbar (B) Composition Toolbar (C) Format Toolbar 1 (D) Format Toolbar 2
(217). Where is the webpage displayed?
(A) Web Server (B) Web Datbase (C) Web Browser (D) Web Source code
(218). Whose name as title page should be given when multiple WebPages are created?
(A)Web browser (B) Web Server (C) Web Source code (D) Website
(219). With which extension a file in KompoZerbe saved?
(A) .htm, .html (B) .hmt,hmtl (C) .cp,cmp (D) .pub,.pab
(220). Form which toolbar is Heading selected to given title to the form?
(A)format Toolbar 1 (B) Format Toolbar 2 (C) Composition Toolbar (D) Edit Mode Toolbar
(221). On which toolbar is Align center icon which is used to align Form heading in center located?
(A) Format Toolbar 1 (B) Format Toolbar 2
(C) Composition Toolbar (D) Edit Mode Toolbar
(222). Which alignment is available for text alignment in KompoZer?
(A)Align Left, Align (B) Align Center (C) Align Justified (D) All of these
(223). When radio button option is selected in Field Type then which option is seen in Field Setting?
(A)Group Name (B) Field Value (C) Initially Selected (D) All of these
(224). How should the name of radio buttons in same group be?
(A)same (B) Different (C) Various forms (D) Any of these
(225). When check box option is selected in field Type then which option is seen in Field Setting?
(A)Field Name (B) Field Value (C) Initially Checked (D) All of these
(226). Which option should be selected when a check box should appear selected by default?
(A)Field Name (B) Field Value (C) Initially Check (D) Initially Checked
(227). Whose values should be given in create text area field?
(A) Rows, columns (B) Height, width (C)Top ,Bottom (D) Up, Down
(228). Which options are displayed in Selection List properties dialog box beneath option drop down menu?
(A)Text (B) Value (C) Initially Selected (D) All of these
(229). Which button should be clicked to add various options of dropdown list?
(A) Add Group (B) Add option (C) Advanced Edit (D) Remove
(230). Which dialog box opens when one selects format ‘page Colors and Background option to change background
color of form ?
(A) Page Colors and background (B) Form Colors and Background
(C) Page Background (D) Background Colors
(231). Which type of colors can be changed using Use custom colors of page Color and Background?
(A)Normal text ,link text (B) Active link text ,Visited link text
(C) Background (D) All of these
(232). Which value should be given to type attribute of input element to create password field in form?
(A) Input (B) password (C)pass_word (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 14 App : Clear Code Technical Technical
Cascading Style Sheets And Java Script
Total Marks:10
(1). Which category is selected from option dialogue box after clicking Tools —» Preferences to make sure that
KompoZer uses CSS by default?
(A) Advanced (B) General (C) Fonts (D) Application
(2). Which dialogue box shows option "Use CSS Styles instead of HTML elements and attributes"?
(A) General (B) Options (C) Preferences (D) Style
(3). Which dialogue box is opened if the file is not saved after clicking cascade button in KompoZer?
(A) Save (B) Page title (C) Save As (D) CSS
(4). Which dialogue box opens in KompoZer after saving a file by clicking a Cascade button?
(A) CSS (B) Stylesheet (C) Styleset (D) CSS Stylesheet
(5). Which button is to be clicked after selecting an element to create a style from CSS Stylesheets?
(A) Style rule (B) Rule (C) Create (D) Create Style rule
(6). Which titled dialogue box of CSS Stylesheets appears for each element for which we add a style rule?
(A) Internal Stylesheet (B) Stylesheet
(C) Selector (D) Styleset
(7). Which radio button is selected to choose font name from the drop down menu in text tab of font family
section in CSS Stylesheets?
(A) unspecified (B) predefined (C) font (D) family
(8). From which of the following drop down menu Center option is selected in text tab of CSS Stylesheets?
(A) Align (B) Tools (C) Alignment (D) Arrange
(9). Which button is to be clicked to select colour from background tab of CSS Stylesheets?
(A) Color Palette (B) Palette (C) Bg Color (D) Background
(10). Which check box should be selected to apply the same border on all the four sides from border tab in CSS
Stylesheet?
(A) All four sides use same border style (B) Border style
(B) All Border (D) All side Border
(11). Which option will be disabled by selecting checkbox of "All four sides use same border style”?
(A) Top (B) Bottom
(C) Left and Right (D) (B) and (C) both
(12). In which of the following drop down menus dotted option is available in border tab of CSS Stylesheets?
(A) Shape (B) Style (C) Draw (D) Define
(13). In which of the following sections the preview of the border style used by us can be seen?
(A) View (B) Style view (C) Preview (D) Display
(14). What is shown in General tab of CSS Style sheets dialogue box?
(A) JavaScript (B) CSS code (C) HTML code (D) all of these
(15). . Which of the following sides show CSS button in CSS Stylesheet dialogue box?
(A) bottom right corner
(B) upper right corner
(C) bottom left corner
(D) upper left corner
(16). Which tab is selected from page area to see CSS Stylesheet code in KompoZer?
(A) Design (B) Split (C) Source (D) Edit
(17). What does CSS allow for the website without changing the underlying structure?
(A) Upload (B) Download
(C) Formation (D) Registration
Mahesh Sir - 9724665284 PAGE NO: 15 App : Clear Code Technical Technical
(18). When can we make changes to the website without the fear of accidentally changing the data?
(A) By separating the layout and format properties of the website from its underlying logical structure
(B) While CSS is not used
(C) While Javascript is not used
(D) None of these
(19). How much the code has to be inserted in CSS as compared to that in HTML?
(A) More (B) less (C) medium (D) can not be determined.
(20). How will the web pages load as the CSS has less code compared to that in HTML?
(A) Slowly (B) Very slowly (C) Faster (D) Medium faster
(21). Which of the following statements is true in reference of browser and CSS?
(A) The CSS compatibility varies with different browsers.
(B) Some of the style sheet features are not supported by the browser.
(C) Now-a-days, the latest browser versions are more standard-compliant.
(D) All of these
(22). which of the following features is not supported by the browser?
(A) Form (B) Stylesheet (C) Table (D) List
(23). What was originally used to control the appearance of web pages?
(A) JavaScript (B) Java (C) HTML (D) C
(24). "The web pages designed using HTML are static and cannot be changed after the browser rendered them."
Specify this statement.
(A) This statement is false. (B) This statement is true.
(C) It depends on browser. (D) It depends on OS.
(25). Which kind of web pages can be provided only by HTML?
(A) Static (B) Dynamic (C) Animated (D) All of these
(26). Why did Netscape develop JavaScript?
(A) As HTML can provide only static web pages.
(B) The demand of more interactivity created the need for a new web programming language.
(C) A and B both
(D) None of these
(27). In which of the following, JavaScript allows to add programming aspects?
(A) Web page (B) Table (C) List (D) Image
(28). A scripting language does not contain advanced programming functionalities of the following language?
(A) C (B) Java (C) A and B both (D) None of these
(29). Which of the following adds interactivity in HTML pages?
(A) CSS (B) JavaScript (C) Table (D) List
(30). Today, which of the following web browsers support JavaScript?
(A) Mozilla Firefox (B) Internet Explorer
(C) Chrome, Safari (D) All of these
(31). Which kind of code can be included in Webpage after using JavaScript?
(A) That allows interactivity with the user. (B) To control the browser.
(C) For dynamically created HTML content. (D) All of these
(32). Which of the following will restrict users from making mistakes?
(A) Interactivity (B) Validation (C) Communication (D) Non- interactivity
(33). Which is the most common form of JavaScript application today?
(A) Client side script (B) Server side script (C) Site side script (D) None of these
(34). The form is generally checked for which of the following things using JavaScript?
(A) Has the user left any required field empty? (B) Has the user entered a valid E-mail address?
(C) Has the user entered a valid date? (D) All of these
Mahesh Sir - 9724665284 PAGE NO: 16 App : Clear Code Technical Technical
(35). What do sort of code the lines between the <script> and </script> tag contain?
(A) CSS (B) JavaScript (C) HTML (D) All of these
(36). In which of the following sections of an HTML page can JavaScript be placed?
(A) <Body> (B) <Head> (C) (A) Or (B) (D) <P>
(37). Which of the following tags tells the browser to interpret all the text between that tag as a script?
(A) <Script> (B) <Body> (C) <Style> (D) <Head>
(38). In JavaScript, what is write in document.write ("Hello") statement?
(A) Method (B) Variable (C) Constant (D) Argument
(39). To which of the following methods the string to be displayed is passed as variable?
(A) document. show() (B) document.var()
(C) document.write() (D) write.document()
(40). Which of the following symbols is used as a mark of separation rather than termination?
(A) ; (B) : (C) . (D) ,
(41). How the JavaScript statements can be grouped together as?
(A) Image (B) Symbol (C) Block (D) None of these
(42). Which of the following is an option to create a new form?
(A) Insert —> Form —> New Form (B) Insert —> Form —> Define Form
(C) Insert —> Form —> Form Design (D) Insert —> Define Form
(43). Why should be the names given to the form, input field or any other field kept easy?
(A) As they will be referenced in the script frequently.
(B) Our work becomes easy.
(C) A and B both (D) None of these
(44). Which dialogue box will appear by clicking Advanced Edit button of Form Properties dialogue box?
(A) Advanced Edit (B) Advanced Property Editor
(C) Advanced Editor (D) Property Editor
(45). Which tab is selected from Advanced Property Editor to write JavaScript?
(A) JavaScript (B) Script
(C) Jscript (D) JavaScript Events
(46). Which of the following options is selected to implement a particular function when user clicks on Submit
button form Attribute of JavaScript Events tab of Advanced Property Editor dialogue box?
(A) submit (B) onsubmit (C) onclick (D) click
(47). What is specified by the options onsubmit and value given in "attribute" option of Advanced Property
Editor?
(A) When submit button is clicked, statements of validateForm() function will be implemented.
(B) validateFormO button will be created.
(C) A and B both
(D) None of these
(48). Which of the following has the block of code written inside?
(A) Square bracket ([ ]) (B) Curly brackets ({})
(C) Round bracket (()) (D) None of these
(49). Which of the following functions takes the text and displays it in an alert box?
(A) alert () (B) prompt () (C) function() (D) form()
(50). When will the function be executed?
(A) By an event (B) When it is called inside a source code.
(C) A and B both (D) None of these
(51). In which of the following sections can the HTML function be defined?
(A) Head (B) Body (C) (A)Or(B) (D) Script

Mahesh Sir - 9724665284 PAGE NO: 17 App : Clear Code Technical Technical
(52). In which of the following ones does the function accept values?
(A) In single quotation (' ') (B) In bracket (())
(C) In double quotation ("") (D) In curly brackets ({})
(53). If the function returns a value, then which statement is used preceding a function?
(A) Not null (B) return (C) value (D) true
(54). What is known as when the user clicks on “Submit” button?
(A) Event (B) Event Handler
(C) A and B Both (D) None of these
(55). 1The interaction between which of the following causes the browser to generate an event?
(A) User and Kernel (B) User and Web page
(C) Kernel and Web page (D) None of these
(56). When an event occurs, a specific JavaScript code is executed in response to a given situation.
What is known as this JavaScript code?
(A) Event (B) Event handler (C) (A) Or (B) (D) Noe of these
(57). What is the name of an event handler of click event?
(A) click() (B) clickon() (C) onclick() (D) retum()
(58). Which of the following event handler is used in excemple of Text book?
(A) onclick() (B) onsubmit() (C) onreturn() (D) onreset()
(59). The function validateForm() will return a value either True or False depending upon which of the following
fields in the text book ?
(A) Form (B) Name (C) Uname (D) Fname
(60). What is returned by validateForm() function according to its statement when name field has a value ?
(A) True (B) False (C) On (D) 1
(61). What can be said for the case of variable in JavaScript?
(A) They are case-sensitive. (B) They are not case-sensitive.
(C) Characters are not part of the variable. (D) None of these
(62). Which of the following can be stored in variable?
(A) Numbers (B) String (C) Texts (D) All of these
(63). Which statement is used to give value 3 for the variable ‘x’ in JavaScript?
(A) var x = = 3; (B) var x = 3; (C) x = 3; (D) x : = 3;
(64). Write a statement to give value of input text field which is in jsl form to the variable ‘x’?
(A) var x = document.jsl.name.value; (B) x = document.jsl.name.value;
(C) var x = jsl.name.value; (D) var x = jsl.name;
(65). Which statement is used to change the flow of the program?
(A) var (B) if (C) for (D) while
(66). Why does 'if' statement check expressions?
(A) To validate specific condition. (B) To repeat specific expressions.
(C) A and B both (D) None of these
(67). What is used to control the web browser sometimes?
(A) HTML (B) CSS (C) JavaScript (D) Jscript
(68). What is split into different parts or objects in BOM model?
(A) Browser (B) Web page (C) Users (D) Web site
(69). What do we not have to create in a browser object model as they are automatically created when the
browser opens the Webpage?
(A) Variable (B) Method (C) Object (D) All of these
(70). Document object is contained by which of the following objects?
(A) Form (B) Window (C) Link (D) History

Mahesh Sir - 9724665284 PAGE NO: 18 App : Clear Code Technical Technical
(71). Which of the following is controlled by the methods of document object?
(A) Web page (B) Window
(C) Link (D) CSS
(72). Which elements of the Webpage are contained within the document object?
(A) Forms, Images (B) Links
(C) Other elements (D) All of these
(73). Which of the following object does the Form object contain?
(A) Element (B) Document (C) Window (D) Location
(74). What is focus in JavaScript?
(A) Method (B) Attribute (C) Object (D) Variable
(75). Where the cursor will be placed using focus method?
(A) Outside the element (B) Inside the element
(C) Upper line of the element (D) Next lined of the element
(76). By which colour asterisk (*) are some fields marked while filling forms on Internet?
(A) Red (B) Green (C) Black (D) Yellow
(77). What is to be added for any field of the form?
(A) Label (B) Input field (C) A and B both (D) None of these
(78). To work with which of the following, JavaScript uses built-in functions?
(A) Logical (B) Numeric
(C) Relational (D) Binary
(79). Which value isNan() function returns if the value is not-a-number?
(A) True (B) False (C) Nan (D) Not Nan
(80). Which value isNaN() function returns in JavaScript?
(A) True (B) False (C) 1 (D) 0
(81). Which of the following is OR operator in JavaScript?
(A) = (B) || (C) ; (D) .
(82). Which is a statement o display alert message “Enter the pincode property”?
(A) Alert("Enter the Pincode properly");
(B) alert("Enter the Pincode properly");
(C) A and B both
(D) None of these
(83). Which is the value of option “Choose the city”of the city field in text book?
(A) 0 (B) -1 (C) 1 (D) 2
(84). Which option is selected from Insert menu to make changes in the field of the form by opening form in
KompoZer?
(A) Form —> Field (B) Form —> change Field
(C) Form —> Form Field (D) Form —> Edit Field
(85). If the gender is an array with two elements, and both the elements are false then what is selected by the
user?
(A) First (B) Second
(C) A and B both (D) No option
(86). Which value indicates that not a single option is selected by the user for the city field?
(A) 0 (B) 1 (C) -1 (D) Null
(87). Which of the following is an equality check operator in JavaScript?
(A) = (B) && (C) == (D) II
(88). Which dialogue box will open by selecting Tools —> preferences?
(A) Style (B) CSS (C) Options (D) Preferences

Mahesh Sir - 9724665284 PAGE NO: 19 App : Clear Code Technical Technical
(89). Which option is selected from General category after clicking Edit Preferences to make sure that KompoZer
uses CSS by default?
(A) Use CSS style instead of HTML elements and attributes.
(B) Use cascading style sheet
(C) Don't use HTML elements
(D) Use CSS Sytle
(90). Which of the following toolbar contains Cascade button in KompoZer?
(A) Format Toolbarl (B) Format Toolbar2 (C) Composition Toolbar (D) Edit Mode Toolbar
(91). When is the file saved in KompoZer?
(A) After giving a page title (B) Before giving a page title
(B) Any of these (D) None of these
(92). What is to be selected from the following to create the style rule for an element from CSS StyleSheets
dialogue box?
(A) Drop down menu (B) Radio button
(C) Check box (D) Text area
(93). Which dialogue box will appear by selecting hi element from the dropdown menu?
(A) General, Text (B) Background, Borders
(C) Box, Lists, Aural (D) All of these
(94). "To give a specific style to the element all the tabs may not be applicable to the selector for which the style
rule is created." clarify this statement.
(A) This statement is true (B) This statement is false
(C) It depends on KompoZer version. (D) It depends on kernel
(95). Which of the following drop down menu contains Uppercase option in text tab of CSS Stylesheets?
(A) Case (B) Tools (C) Change case (D) Change
(96). Which tab is selected to choose background colour in CSS Stylesheets?
(A) Back (B) Bg (C) Bgcolor (D) Background
(97). Which dialogue box will open by clicking on color palette option?
(A) Block color (B) Block background color
(C) Background color (D) Back color
(98). Which option will be enabled and all others will be disabled by selecting checkbox of "All four sides use
same border style"s?
(A) Top (B) Bottom
(C) Left and Right (D) (B) and (C) both
(99). By selecting which of the following options, the effect made on a single side will be applied on all the four
sides?
(A) Top (B) Bottom (C) All (D) Left
(100). Which options are available for border in border tab of CSS Stylesheets?
(A) Style (B) Width (C) Color (D) all of these
(101). In which of the following tabs the css code shown, is generated through CSS Stylesheet dialogue boxes?
(A) General (B) Lists (C) Aural (D) Text
(102). Which option is selected from CSS button drop down to create a style for any other element after creating a
style for a single element?
(A) Style-rule (B) Rule (C) Style (D) CSS
(103). which option is selected to insert page title in KompoZer from Format toolbar 1?
(A) Heading 1 (B) HI (C) Title 1 (D) Tl
(104). Which of the following allows us to set the format of the website without changing the underlying structure?
(A) JavaScript (B) CSS (C) HTML (D) Java

Mahesh Sir - 9724665284 PAGE NO: 20 App : Clear Code Technical Technical
(105). By separating which of the following from its underlying logical structure we can make changes to the website
without the fear of accidently changing the data?
(A) Layout of the website (B) Format properties of the website
(C) A and B both (D) None of these
(106). In which of the following files does the website designer need to make modifications to change the style of an
element?
(A) Web page (B) Text (C) Only CSS (D) A and B both
(107). Why is the code to be inserted less in CSS as compared to that in HTML?
(A) As to set the style for each element only once (B) As to set the style for each element frequently
(C) As advanced technology is used (D) None of these
(108). How is the construction of website made by using CSS?
(A) quickly (B) efficiently (C) A and B both (D) None of these
(109). Mention with which the CSS compatibility varies?
(A) Different browsers (B) Different editors
(C) A and B both (D) None of these
(110). Now-a-days, which issue is reduced because of the latest browser versions?
(A) Table (B) List (C) CSS compatibility (D) Image
(111). Which kind of the web pages will be designed using HTML?
(A) Dynamic (B) Static (C) Image (D) Portable
(112). With which of the following growth, people demand the websites to have greater interactivity and better
visual design?
(A) Open Source (B) Internet (C) Browser (D) CSS
(113). What is developed by Netscape?
(A) CSS (B) HTML (C) JavaScript (D) Browser
(114). Which of the following aspects is allowed by scripting language JavaScript to Web pages?
(A) Animated Drawing (B) Multi media
(C) Programming (D) Recording
(115). State which kind of programming language scripting language is.
(A) Simple (B) Lightweight (C) A and B both (D) None of these
(116). Why is JavaScript used in Web page?
(A) To improve the design (B) To validate the form
(C) To add interactivity (D) All of these
(117). In which of the following ways JavaScript is inserted in HTML code?
(A) Indirectly (B) Directly (C) No way (D) None of these
(118). Which kind of webpage does it not remains after using JavaScript?
(A) Static (B) Dynamic (C) A and B both (D) None of these
(119). Why it is necessary to provide validation in form?
(A) User may not leave some of the important fields empty.
(B) User may not enter the data in a wrong format inside the field.
(C) A and B both
(D) None of these
(120). What should happen when user enters wrong data or leaves a field empty?
(A) An error message should be generated. (B) The form should not be submitted.
(C) A and B both (D) None of these
(121). On which of the following sides is JavaScript used to validate the data entered in the HTML forms before
sending it to the server?
(A) Server (B) Client (C) Network (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 21 App : Clear Code Technical Technical
(122). Which of the following statements is true in case of JavaScript?
(A) JavaScript code runs from within the HTML web page.
(B) JavaScript code can be put directly inside the Webpage code as a separate section.
(C) JavaScript code is inserted into as HTML page, using the <script> ... </script> tag.
(D) All of these
(123). Which kind of language is JavaScript?
(A) Containing only text (B) Containing only symbols
(C) Containing only numbers (D) Case-sensitive
(124). Which section is preferred to place the JavaScript in HTML?
(A) <Body> (B) <Head> (C) <Style> (D) <P>
(125). In JavaScript, what is write in document.write ("Hello") statement?
(A) A part of a document object (B) Method
(C) (A) Or (B) (D) Argument
(126). In JavaScript, what is passed as variable in document.write("Hello") statement?
(A) document (B) write (C) Hello (D) .
(127). Which kind of symbol the semicolon (;) is, when given at the end of the statement in JavaScript?
(A) Compulsory (B) Optional
(C) At least once it is necessary. (D) None of these
(128). In JavaScript, the semicolon is used in lieu of following rather than termination?
(A) Group (B) separation (C) Code break (D) Page break
(129). What starts and ends with the curly brackets ({}) in JavaScript?
(A) Block (B) Variable (C) Statement (D) All of these
(130). Whose name should be kept simple and easy to remember while creating a form in JavaScript?
(A) Form (B) Input field (C) Any other field (D) All of these
(131). Which dialogue box will appear by clicking Insert—> Form Define Form?
(A) Define Form (B) Form (C) Form Properties (D) Properties
(132). Which dialogue box contains Advanced Edit button?
(A) Advanced Editor (B) Form (C) Form Properties (D) Properties
(133). Which of the following options are shown in JavaScript Events tab of Advanced Property Editor dialogue
box?
(A) Attribute (B) Value (C) A and B both (D) Events
(134). When an event of "attribute" option occurs, the function which is to be implemented is written using one of
the following options.
(A) Value (B) Name (C) Function (D) Form
(135). Which keyword is used to define a function?
(A) Script (B) JFunction (C) Function (D) Javafunction
(136). Which of the following is an inbuilt function?
(A) validateForm() (B) alert() (C) A and B both (D) None of these
(137). What will be displayed when the function alert("Hello Students") is called?
(A) An alert box with the message "Hello Students"
(B) "Hello Students" message with animation
(C) "Hello Students" message will blink.
(D) None of these
(138). From where can the function be called from within the source code?
(A) Upper side (B) Down side (C) Anywhere (D) Cannot be called
(139). Which of the following is called by its name and it takes a value inside the parenthesis?
(A) Function (B) Script (C) CSS (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 22 App : Clear Code Technical Technical
(140). What is called the value passed to the function
(A) Parameter (B) Variable (C) Constant (D) Value
(141). Which function is called on the click event of the submit button in textbook?
(A) Form() (B) Validate() (C) ValidateForm() (D) VForm()
(142). What is useful in creating interactive web pages which responds to the action performed by the user?
(A) CSS (B) HTML (C) Java (D) JavaScript
(143). What takes place when the user does something?
(A) Script (B) Program (C) Event (D) Code
(144). Which kind of names are kept for event handler and event?
(A) Different (B) Same (C) Only numeric (D) None of these
(145). For which of the following events is onsubmit() event handler used?
(A) click (B) submit (C) return (D) onretum
(146). Which of the following functions is called by onsubmit() event handler in text book ?
(A) validateForm() (B) validate() (C) Form() (D) vForm()
(147). Which of the following value validateForm() function returns in the text book ?
(A) True (B) False (C) -1 (D) (A)Or(B)
(148). For which of the following a variable is a container?
(A) Form (B) Script (C) data (D) Table
(149). What can be said for variable ‘x’ and ‘X’?
(A) They are same. (B) They are different
(C) It depends on script, (D) It depends on version.
(150). Which key word is used to declare a variable in JavaScript?
(A) variable (B) function (C) var (D) vari
(151). Which statement is used to give value "Hello Students" for the variable 'y' in JavaScript?
(A) var y = = "Hello Students"; (B) var y = Hello Students;
(C) var y = "Hello Students"; (D) var y = 'Hello Students';
(152). Which kind of statement 'if' is?
(A) Conditional (B) Unconditional (C) Loop (D) File
(153). Why 'if' statement is used?
(A) To repeat statements of program. (B) To change the flow of program.
(C) A and B both (D) None of these
(154). Write a statement to check whether the variable 'x' is having null value or not?
(A) if(x = null || x = " ") (B) if (x = = null || x = = " ")
(C) if x = null || x = = " " (D) if x = not null
(155). What is used to control the web browsers window or web pages?
(A) DOM (B) BOM (C) MOB (D) OBM
(156). What can be used in the browser object model to change the window or elements displayed in the
browser?
(A) The properties (B) Methods of objects (C) A and B both (D) None of these
(157). Which object of BOM represents the browser window or individual frame within the window?
(A) Window (B) Document (C) Form (D) Link
(158). Which of the following is controlled by the methods of window object?
(A) Web page (B) Web browser window
(C) Link (D) CSS
(159). Which is the most important object in the browser object model?
[OR] Which object is used to represent the Webpage displayed in the browser?
(A) Window (B) Document (C) Form (D) Link

Mahesh Sir - 9724665284 PAGE NO: 23 App : Clear Code Technical Technical
(160). The form object which is used by JavaScript to represent forms created using <form> element is within
which object?
(A) Window (B) Document (C) History (D) Location
(161). Which of the following can be element objects?
(A) Text area, Button (B) Password, Select (C) Reset (D) All of these
(162). Which method is used to focus on a particular element of the form?
(A) document (B) focus (C) blur (D) highlights
(163). What kind of element can be created by using focus method?
(A) Highlighted (B) Italics (C) Underlined (D) Light
(164). What does the red asterisk (*) indicate, while filling forms on Internet?
(A) It is a compulsory field.
(B) It should not be kept empty.
(C) A and B both
(D) None of these
(165). Which validation is applied for pincode field in text book?
(A) User should not keep the field empty. (B) The pincode should be 6 digits long.
(C) Only numbers are allowed. (D) All of these.
(166). Which type of function is isNaN () in JavaScript?
(A) Text (B) Numeric (C) Logical (D) Relational
(167). Which value isNan() function returns if the value is a number?
(A) True (B) False (C) Nan (D) Not Nan
(168). Which of the following functions returns True value?
(A) isNaN("Hello") (B) isNaN(123) (C) isNaN(45.84) (D) (B) and (C) both
(169). Write if statement for a variable y which is empty, not a number, not equal to six digits?
(A) if (y= " " || isNaN(y) || y.length > 6)
(B) if (y= ="" || isNaN(y) || y.length >6 || y.length <6)
(C) A and B both
(D) None of these
(170). Which is a statement in jsl form to place cursor in pincode field and highlight it?
(A) document.jsl.pincode.focus();
(B) document.jsl.pincode.onfocus();
(C) A and B both
(D) None of these
(171). Which respective values are given to all the options in the city field Ahmedabad, Rajkot, Surat in text book?
(A) 0,1,2 (B) 1,2,3 (C) -1,0,1 (D) 2,3,4
(172). How Form properties dialogue box can be opened?
(A) Insert —> Form —> Define Form
(B) By right click in the form and select Properties option.
(C) A and B both
(D) None of these
(173). How does the first element of gender array( array with radio button) recognize?
(A) gender [-1] (B) gender [0] (C) gender [1] (D) gender [F]
(174). Which of the following is ‘And’ operator in JavaScript?
(A) II (B) && (C) == (D)
(175). Which operator is used to assign value to the variable in JavaScript?
(A) = (B) && (C) == (D) II

Mahesh Sir - 9724665284 PAGE NO: 24 App : Clear Code Technical Technical
Designing Simple Website Using Kompozer
Total Marks: 8
(1). Which of the following is not an important point to be considered for developing a good website as part of
planningprocess?
(A) Purpose (B) Audience (C) Content (D) Input
(2). Which of the following content provides an overview of the site, organization, products and services, and
other items?
(A) Detailed (B) Long (C) General (D) Short
(3). Which of the following is the first page that opens when the user enters the URL address in the address bar of
the browser?
(A) Home page (B) Last page (C) Web page (D) First page
(4). Which of the following is a variable that is stored on the user's computer?
(A) Integer (B) HTML (C) Cookie (D) Java
(5). Which of the following plays a very important role in a business now-a-days?
(A) Magazine (B) News paper (C) Website (D) Conferences
(6). Which of the following is a collection of interlinked web pages for a specific purpose?
(A) Web site (B) Link (C) URL (D) None of these
(7). How the website should be designed?
(A) Users find the website informative. (B) Users visit it repeatedly.
(C) A and B both (D) None of these
(8). What should be clearly identified of a website?
(A) Audience (B) Purpose (C) Content (D) Medium
(9). What may be the purpose for creating the website?
(A) To provide information to a group of people. (B) To attract the new customer.
(C) To sell the products online. (D) All of these
(10). Before creating which of the following parts we should know the expected users of the website?
(A) Designing (B) Publishing (C) Animation (D) None of these
(11). The proportion of the different type and extent of detailed and specific information depends only on the
following.
(A) Medium (B) Nature of the expected audience
(C) Purpose (D) Content
(12). Which kind of information website must contain?
(A) Incomplete and irrelevant (B) Complete and relevant
(C) Complete and irrelevant (D) Detailed and irrelevant
(13). Which kind of content will satisfy users and sustain their interest in the website?
(A) Appropriate and relevant (B) Incomplete and irrelevant
(C) Improper and incomplete (D) Detailed and irrelevant
(14). Which of the following types of content provides an overview of the site, organization, products and services
and other items?
(A) General (B) Detailed (C) Marginal (D) None of these
(15). Which of the following should be made as easy as possible in website?
(A) Map (B) Navigation (C) Image (D) None of these
(16). Which of the following is a valuable tool for businesses and other organizations when composed of the right
material?
(A) Web bank (B) Website (C) Web data (D) None of these
(17). Which of the following is popular web browser
(A) Mozilla Firefox (B) Internet Explorer (C) Chrome, Opera (D) All of these
(18). Which E-Commerce website is designed in Text book
(A) School (B) School Plaza (C) School Zone (D) School Site
(19). Where will the title be displayed in the web browser?
(A) In Status bar (B) In Body section (C) In Title bar (D) In Heading bar

Mahesh Sir - 9724665284 PAGE NO: 25 App : Clear Code Technical Technical
(20). Where is every website built on a web server?
(A) In Partition (B) In Directory (C) In File (D) Any one of these
(21). On which of the following web page is a separate file?
(A) Web server (B) Browser (C) Client (D) None of these
(22). When we type a URL in web browser, what does web server need to display some content?
(A) Default directory (B) Web directory (C) Default file (D) Web file
(23). How does Table Properties dialogue box open?
(A) By selecting and double clicking a table.
(B) By right clicking on a table.
(C) (A) Or (B)
(D) None of these
(24). Which option is to be selected after Insert -> Table option to insert table of one row and two columns?
(A) 1X2 (B) 2X1 (C) 1&2 (D) 2 & 1
(25). In which input box of Image Properties dialogue box, alternate text is specified?
(A) Alternate text (B) Image text (C) Optional text (D) Text
(26). When will alternate text be displayed in place of image in browser?
(A) When image file size is large.
(B) When image file size is short.
(C) When image cannot be displayed in a browser.
(D) None of these
(27). In which of the following dialogue boxes is Dimensions tab seen?
(A) Image Properties (B) Table Properties (C) Link Properties (D) Properties
(28). How can categories be linked?
(A) Which takes us to the related page of the selected category.
(B) Which takes us to the pages in sequential manner.
(C) Which takes us to the pages in random manner.
(D) None of these
(29). Which of the following options of Link Properties dialogue box is to specify a file name to be opened?
(A) Link (B) Set Link (C) Set (D) Link Location
(30). Which label (ID) is given in the textbook to first check box for checked or unchecked an item?
(A) bl (B) ql (C) cl (D) al
(31). Which ID is given to the first text box of entering Quantity in Text book?
(A) al (B) ql (C) cl (D) bl
(32). Which information will be displayed in a page by clicking on purchase button?
(A) Total items purchased (B) Total amount
(C) A and B both (D) None of these
(33). .Which of the following statement of “bl” id checks whether the check box for iteml is checked or not by user?
(A) document.getElementByID("bl").checked (B) document.getElementByID("bl").selected
(C) checkbox.getElementByID("bl").checked (D) document.checkbox.bl.checked
(34). Which symbol is used to separate description of individual products?
(A) ; (B) , (C) : (D) .
(35). Which of the following are useful as they provide feature to remember and track preferences , purchases,
commissions and other information required for better visitor experience or site statistics?
(A) Script (B) Event (C) Cookies (D) Constant
(36). By using Which property of the document object, JavaScript can manipulate Cookies?
(A) window (B) document (C) form (D) script
(37). Which function accepts data from cookie and stores it in array in text book?
(A) oncart() (B) myfun() (C) purchase() (D) fun()
(38). According to the textbook by clicking on which button user will be asked to login in case he/she has not
logged in?
(A) Add to cart (B) Proceed to checkout
(C) checkout procedure (D) Sign in
(39). What is required to create to handle website?
(A) Presentation (B) Text File (C) Spread sheet (D) Database

Mahesh Sir - 9724665284 PAGE NO: 26 App : Clear Code Technical Technical
(40). What is known as the process to publish a website?
(A) Downloading (B) Uploading (C) Connecting (C) All of these
(41). When can we upload a website?
(A) If we have an account on the web server.
(B) If we are a member of Google.
(C) If we are a member of Ubuntu.
(D) None of these.
(42). Which of the following statement is true?
(A) We can buy space from professional hosting providers.
(B) Many web hosts provide limited free space to the users.
(C) Free space can be for a limited time period.
(D) All of these
(43). Which dialogue box will open by giving File --> Publish option?
(A) Publish Page (B) Publish (C) Page (D) Webpage
(44). Which protocol is used to transfer web pages from our computer to the web host?
(A) FTP (B) SMTP (C) SSL (D) IP
(45). Which of the following open source web development tools are easily available on net and used by web
developers to develop website with ease?
(A) Aptana Studio (B) BlueGriffon (C) Amaya (D) All of these
(46). What is Aptana studio from following?
(A) Open source IDE (B) Authorized IDE
(C) Open source CLI (D) Authorized CLI
(47). Which of the following IDE comes along with a large number of additional plugins?
(A) Amaya (B) Aptana Studio (C) Netbeans (D) None of these
(48). Aptana studio can be downloaded easily from the following site.
(A) aptana.org (B) aptana.net (C) aptana.com (D) aptana.web
(49). Which of the following is free open source for WYSIWYG HTML editor?
(A) Kompozer (B) BlueGriffon
(C) Amaya (D) All of these
(50). Which languages does BlueGriffon support?
(A) English , Dutch (B) German , Chinese (C) Many more (D) All of these
(51). Which is free open source WYSIWYG web editor developed by the W3C?
(A) Kompozer (B) BlueGriffon (C) Amaya (D) Aptana
(52). Which kind of web editor is Amaya called?
(A) Free (B) Open source (C) WYSIWYG (D) All of these
(53). On which system has Amaya grown into an editor based one?
(A) HTML/CSS (B) PHP (C) JavaScript (D) XML
(54). In which section of the Amaya web editor can we see the source of the web page?
(A) upside (B) downside (C) Left side (D) Right side
(55). Which of the following offers limited free space on the web server?
(A) ISP (B) Google (C) ISS (D) Yahoo
(56). Which of the following helps in promoting the business, selling the products and attracting a large number of
customers?
(A) Website (B) Webpage (C) Form (D) CSS
(57). Which of the following information should a website contain?
(A) Complete, Relevant (B) Complete, Irrelevant
(C) Incomplete, Irrelevant (D) Incomplete, Relevant
(58). Which of the following is a collection of interlinked web pages?
(A) Webpage (B) Form (C) Kompozer (D) Website
(59). Which of the following filename is the home page of the website saved as?
(A) first.html (B) index.html (C) home.html (D) one.html
(60). Which of the following stands for FTP?
(A) File Truncate Protocol (B) File Transfer Process
(C) Fine Tune Protocol (D) File Transfer Protocol

Mahesh Sir - 9724665284 PAGE NO: 27 App : Clear Code Technical Technical
(61). If the website should have good design techniques then which of the following enables the company?
(A) To get the maximum amount of traffic. (B) Making the maximum amount of profit.
(C) A and B both (D) None of these
(62). Which kind of website creation is a challenge?
(A) Interactive, Accurate (B)User friendly
(C)Providing accurate and useful information (D) All of these
(63). Which of the following points should be considered for developing a good website as a part of planning
process?
(A) Purpose (B) Audience (C) Content, Medium (D) All of these
(64). What should be clear before creating a website?
(A) Definition (B) Goal (C) A and B both (D) None of these
(65). What can be properly developed after deciding the purpose of the website?
(A) Content (B) Layout (C) A and B both (D) None of these
(66). Which kind of information should the website contain?
(A) General (B) Detailed (C) A and B both (D) None of these
(67). If large graphical files are kept on the website, then it will take how much time to download
(A) Long (B) Short (C) Medium (D) Very Short
(68). When do the users leave the website?
(A) If the information provided is incomplete (B) If website takes a long time to download
(C) A and B both (D) None of these
(69). Into which of the following categories should the website content be classified?
(A) Incomplete and irrelevant (B) Extra ordinary and irrelevant
(C) General and detailed (D) Improper and irrelevant
(70). Which of the following types of content provides users with the detailed information on the site like
products and services?
(A) General (B) Detailed (C) Marginal (D) None of these
(71). Which kind of information should be available and easily accessible to ensure that the site can serve its
intended purpose?
(A) General (B) Detailed (C) A and B both (D) None of these
(72). For which of the following devices should the website design scale
(A) Computers (B) Smart phones (C) Tablets (D) All of these
(73). Which of the following points should be kept in mind while designing a website
(A) Its design should scale for all the devices like computers, smart phones and tablets
(B) It should be well displayed in all popular browsers like Mozilla Firefox, Chrome, Opera ,etc.
(C) A and B both
(D) None of these
(74). What is known for the designs used to create the website?
(A) Wizard (B) Design (C) Template (D) Prototype
(75). Which page of the website is generally named as index.html?
(A) Which contains site map (B) Middle
(C) Home (D) Last
(76). Which kind of file a web page is on web server?
(A) Combined (B) Separate
(C) Multi Programming (D) None of these
(77). “Whenever the user types the URL of the web site in the browser, user does not specify the file to be
opened.” What is to be said for this statement?
(A) This statement is true. (B) This statement is false.
(C) It depends on web browser. (D) It depends on website.
(78). What does server look for when we type a URL without the filename to display it automatically?
(A) Default file (Index.html) (B) Web file
(C) Default directory (D) Index directory
(79). Which tabs are shown in Table Properties dialogue box?
(A) Row and Column (B) Align and Border
(C) Size and Spacing (D) Table and Cells

Mahesh Sir - 9724665284 PAGE NO: 28 App : Clear Code Technical Technical
(80). Which dialogue box will open by selecting option Insert —> Image?
(A) Image (B) Image Properties (C) Properties (D) Picture Properties
(81). Which radio button is selected in case you do not want to give alternate text?
(A) Don’t show alternate text (B) Don’t use text
(C) Don’t use alternate text (D) Don’t show text
(82). Which tabs are seen in Image Properties dialogue box?
(A) Location (B) Dimensions, Link (C) Appearance (D) All of these
(83). In which option of dimensions tab you can specify height and width as 100 % to display image in the whole
cell?
(A) Size (B) Custom (C) Set (D) Custom Size
(84). Which dialogue box will open by clicking on Insert -» Link?
(A) Hyperlink Properties (B) Link Location
(C) Link Properties (D) Link settings
(85). Which label is inserted in the textbook to add an item to the shopping cart by selecting it?
(A) Add to shopping cart (B) Add to cart
(C) Shopping cart (D) Add cart
(86). What is the initial value of Quantity text box in Text book?
(A) 0 (B) 1 (C) 2 (D) 5
(87). Which button is added in text book to display details of a bill?
(A) Add to cart (B) Purchase (C) Order (D) Payment
(88). Which function calls the bill page in Text book?
(A) onpurchase() (B) onclick() (C) oncart() (D) purchase()
(89). Which symbol is used to separate each of the details of product?
(A) ; (B) , (C) : (D) .
(90). What is called as cookie?
(A) Variable which is stored on the user’s computer (B) Event of Mouse
(C) Function of JavaScript (D) None of these
(91). Cookies are useful for which as they provide feature to remember and track preferences, purchases,
commissions . and other information?
(A) Better visitor experience (B) Site statistics
(C) (A) Or (B) (D) None of these
(92). Which of the following processes can be done on Cookies?
(A) Cookies can be read. (B) Cookies can be created and deleted.
(C) Cookies can be modified. (D) All of these
(93). Which of the following function converts the data into number?
(A) int() (B) round() (C) parseFloat() (D) float()
(94). If user is not registered user then what is to be told to create?
(A) New website (B) New account
(C) Web account (D) Network account
(95). Which of the following is a Database store which is created to handle website?
(A) Registered user (B) Login name, Password
(C) Products and other relevant details (D) All of these
(96). What is known as to transfer the web pages, images and stylesheets related to the site, to a web server from
which they may be accessed by the user?
(A) Uploading (B) Publishing (C) Displaying (D) All of these
(97). Which of the following offers limited free space on the web server?
(A) ISS (B) Google (C) ISP (D) Yahoo
(98). Which option is selected to know the settings for the space to set up the system for publishing a website?
(A) Publish —> Publish (B) Tools —> Publish
(C) File —> Publish (D) File —> Publish Page
(99). . By which of the following domain names can be registered on Internet?
(A) Server (B) Protocol (C) Website (D) Web bank
(100). Which of the following is a free open source web development DDE?
(A) Calc (B) HTML (C) KompoZer (D) Base

Mahesh Sir - 9724665284 PAGE NO: 29 App : Clear Code Technical Technical
(101). Which type of application is Aptana Studio called?
(A) Database (B) Spread sheet
(C) Web (D) Animation
(102). Which of the following languages is supported by Aptana studio?
(A) HTML, CSS (B) JavaScript, Ruby
(C) Rails, PHP, Python (D) All of these
(103). Aptana studio 2.0.5 is used to develop web applications using which of the following languages?
(A) HTML (B) CSS
(C) JavaScript (D) All of these
(104). Aptana studio helps to create the following project.
(A) PHP (B) Rails
(C) Ruby, Web (D) All of these
(105). BlueGriffon can be downloaded easily from the following site.
(A) bluegriffon.org (B) bluegriffon.com
(C) bluegriffon.net (D) bluegriffon.web
(106). Which is an intuitive application that provides web developers with a simple user interface which allows them
to create attractive websites without requiring in depth technical knowledge about web standards?
(A) HTML (B) Asp.net
(C) BlueGriffon (D) All of these
(107). By which of the following Amaya web editor is developed?
(A) W3C (B) Microsoft
(C) HP (D) Google Inc.
(108). Which type of editor was Amaya called initially?
(A) HTML/CSS (B) PHP
(C) JavaScript (D) XML
(109). From which of the following websites can Amaya web editor be easily downloaded?
(A) www.w3.org/Amaya
(B) www./Amaya/w3.org
(C) www.Amaya.org
(D) www.Amaya.net
(110). Which of the following are transferred to a web server from which they can be accessed by the users?
(A) Pages (B) Images
(C) Style sheets (D) All of these
(111). From which of the following can we buy space?
(A) Professional hosting providers (B) ISP
(C) Internet Server (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 30 App : Clear Code Technical Technical
Introduction To E-Commerce
Total Marks: 7
(1). Which of the following is newspaper that exists on the Internet in digital form?
(A) I-newspaper (B) Intemet-newspaper
(C) www-newspaper (D) E-newspaper
(2). Which of the following is known as the process of conducting the banking transactions over the Internet?
(A) Auction (B) Bidding
(C) Net banking (D) www-banking
(3). Which of the following is a feature of E-commerce?
(A) Operates within a certain period of time or during business hours.
(B) No sharing of information with competitors.
(C) Location renting or purchasing.
(D) Advertising of the product is done electronically.
(4). Which of the following is a disadvantage of E-commerce?
(A) Privacy
(B) Improved customer service
(C) Speed
(D) Conduct business 24 X 7
(5). Which of the following E-commerce business model refers to activities between different business partners?
(A) Government to Business (G2B) (B) Consumer to Business (C2B)
(C) Business to Business (B2B) (D) Business to Consumer (B2C)
(6). Which of the following E-commerce business model refers to E-commerce activities involving transactions
between and among the consumers?
(A) Government to Business (G2B) (B) Consumer to Consumer (C2C)
(C) Business to Business (B2B) (D) Business to Consumer (B2C)
(7). Which of the following e-commerce business model is also a part of E-governance?
(A) Business to Business (B2B) (B) Consumer to Business (C2B)
(C) Consumer to Consumer (C2C) (D) Government to Citizen (G2C)
(8). From which of the following sources is information available?
(A) Radio, Television (B) Newspaper (C) Internet (D) All of these
(9). During last few decades, due to what Internet has become popular among the individuals as well as business
organizations?
(A) Development in telecommunication infrastructure
(B) Development in software technologies (C) A and B both (D) None of these
(10). What is known as to use Internet for commercial activities?
(A) B-Commerce (B) E-Commerce (C) M-Commerce (D) T- Commerce
(11). Which of the following creates a whole world of global village from where anyone can buy anything at
anytime and
from anywhere?
(A) E-commerce (B) Traditional commerce (C) I-commerce (D) All of these
(12). Which was one of the first applications of E-commerce on Internet?
(A) Internet bookshops (B) Electronic newspaper
(C) Net banking (D) Online auctions
(13). The search of a book can be made by using the following.
(A) Title of the book (B) Author's name (C) Publication name (D) All of these
(14). Which of the following is the largest online bookstore website?
(A) www.amazon.com (B) shopping.indiatimes.com
(C) www.bookshopofindia.com (D) All of these
(15). By using E-newspaper, which process can be removed and it helps in reducing the costs?
(A) Printing (B) Displaying images
(C) Getting-Selling process (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 31 App : Clear Code Technical Technical
(16). Which of the following services is offering the customers to bid the price and sell the product to the highest
bidder?
(A) Net banking (B) Auctions (C) Marketing (D) All of these
(17). What is known as auction that can be implemented using Internet?
(A) Net Auctions (B) Online Auctions (C) E-Auctions (D) None of these
(18). What are you known as when you place a product for auction on auction’s website?
(A) Seller (B) Bidder (C) Mediator (D) Buyer
(19). What is required to do first to sell an item through an online auctions' site?
(A) Process (B) Registration
(C) To deposit money (D) All of these
(20). What is to be built by registration process on online auctions' website?
(A) Spread sheet (B) Text file (C) Database (D) Presentation
(21). What can a seller get for his goods by an online auctions’ website?
(A) Good price (B) Less customers (C) Less price (D) None of these
(22). Which of following is the most popular website for online auctions?
(A) www.ebay.com, www.ubid.com (B) www.mybids.in
(C) www.onlineauction.com (D) All of these
(23). Where do customers put selected products of their choice from online shopping?
(A) Shopping cart (B) Shopping bag
(C) Shopping car (D) Shopping board
(24). Which is the website regarding Indian Railways?
(A) Indianrailway.net (B) railway.com
(C) irctc.co.in (D) irailway.com
(25). How is an E-ticket sent to the customer?
(A) On E-mail (B) Via SMS (C) (A) and (B) both (D) None of these
(26). In which of the following facilities do the companies send their bills to the customers through Internet?
(A) Online billing (B) Online banking
(C) Online exams (D) Offline billing
(27). When does a company use online billing facility?
(A) To send bills to a large number of customers periodically.
(B) To send bills after every three hours.
(C) To send bills every week.
(D) When there is a short number of customers.
(28). Which type of services are the notices and reminders sent to the customers by the companies or banks are?
(A) Help (B) Online Marketing
(C) Information (D) Legal
(29). which services have become increasingly important due to the huge technological changes that have taken
place in the last decade?
(A) Help (B) Billing (C) Net banking (D) All of these
(30). Which is a true statement with reference to support services?
(A) After selling the products, companies provide online support to the customers.
(B) Customers can track the status of their complaints placed online.
(C) Software companies provide online support to their customers for any problem in installation,
configuration or use.
(D) All of these
(31). To whom do software vendors allow to download the recent updates of the software?
(A) Internet users (B) Licensed customers
(C) All the International companies (D) All of these
(32). What do customers give to download software drivers?
(A) Proper product type (B) Product model
(C) A and B both (D) Date of purchasing
(33). What is known as the process of conducting the banking transactions over the Internet?
(A) Online banking (B) Net Banking
(C) A and B both (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 32 App : Clear Code Technical Technical
(34). Today majority of the leading banks have started to provide following transactions over the Internet without
charging any amount?
(A) Net banking Or Electronic banking
(B) To deliver cheque book, pass book at home
(C) A bank person delivers cash to customer's home
(D) All of these
(35). What is provided to the customer by the bank to log into the bank sites?
(A) Net banking password (B) Security key
(C) Digital signature key (D) All of these
(36). Which of the following sites provide online banking?
(A) www.onlinesbi.com, www.iob.in
(B) www.bankofbaroda.co.in, www.centralbankofindia.co.in
(C) www.pnbindia.in & www.denabank.co.in
(D) All of these
(37). How do the businesses have to compete in traditional commerce?
(A) Within a single industry (B) In limited geographical area
(C) A and B both (D) Competition is not there
(38). Which type of products are difficult to sell using E-commerce?
(A) Products that customers prefer to touch.
(B) Products that customers prefer to smell or examine precisely.
(C) A and B both
(D) Products which are having high price.
(39). What is known as the arrangement of products, store design and layout?
(A) E-commerce (B) Merchandising (C) Arrangement (D) All of these
(40). Which of the following are features of E- commerce?
(A) Customers can browse through products catalogue and available offers.
(B) E-payments systems are used for receiving payments or payment on delivery option is also available.
(C) Goods are delivered to the customer within few days.
(D) All of these
(41). Which of the following factors play role for the growth of E-commerce in India?
(A) Increased usage of online classified sites, with more consumers buying and selling second-hand goods.
(B) Evolution of the online marketplace model with sites like eBay, Flipkart, Snapdeal and many more.
(C) Increase in use of mobile devices.
(D) All of these
(42). Which online stores are becoming quite popular in India?
(A) Flipkart, eBay India, Snapdeal (B) Amazon India, Myntra, Domino
(C) PayTM, Jabong (D) All of these
(43). How many Indian E-commerce business companies use cash-on-delivery mechanism?
(A) 50 (B) 20 (C) 80 (D) 100
(44). Why the cash-on-delivery is an expensive proposition from the retailer point of view while getting delivery
Of products?
(A) As they have to finance sale till the order is delivered.
(B) As it makes easy to reject products
(C) A and B both
(D) None of these
(45). Why will E-commerce sales rise in the coming years?
(A) Availability of faster broadband services (B) Availability of new applications
(C) A and B both (D) None of these
(46). Which cost can be reduced using Internet for business activities?
(A) Marketing, Distribution (B) Phone, Postage
(C) Printing and many other such activities (D) All of these
(47). What elimination can benefit the customer by getting a wide range of products for selection at lower cost on
E-commerce website?
(A) Distributor (B) Other middle agencies (C) A and B both (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 33 App : Clear Code Technical Technical
(48). What would be added as a competitive advantage for companies that do business with other companies?
(A) Information services (B) Online customer services
(C) Support services (D) None of these
(49). Which type of Customer service does E-commerce provide?
(A) Better and quicker (B) Unsatisfied
(C) Expensive (D) None of these
(50). Which of the following is an example of E-commerce that helps organizations to work together?
(A) Postal services (B) E-mail (C) Auctions (D) None of these
(51). Which of the following is not an advantage of E-commerce?
(A) Reducing the shipping time (B) Makes customers happier
(C) More business at lower cost (D) None of these
(52). Which of the following are limitations of E-commerce?
(A) Resistance to change, Initial cost
(B) Security, Privacy
(C) Lack of trust, Time for delivery of products
(D) All of these
(53). What is a primary concern in E-commerce security?
(A) Security (B) Speed (C) Storage (D) Auctions
(54). The protection should be provided from of the following to the Internet.
(A) Hackers, Viruses (B) Transfer of data (C) Transaction risks (D) All of these
(55). Which of the following issues arise on returning the goods purchased online on E-commerce?
(A) Who will pay the return postage?
(B) Whether the money will be returned by the merchant or not.
(C) Whether the product will reach to their original source or not.
(D) All of these
(56). Online selling of which of the following products might be tricky?
(A) Clothes (B) Furniture (C) A and B both (D) None of these
(57). Which type of transactions are not preferred to be conducted online using credit card?
(A) Very small (B) Very large (C) A and B both (D) None of these
(58). The problem in Internet connectivity causes risk for one of the following.
(A) E-mall (B) Business (C) A and B both (D) None of these
(59). Which Business models of E-commerce are most popular?
(A) B2C and B2B (B) C2C (C) C2B (D) All of these
(60). Which business model refers to business and organizations that sells products or services to consumers over
the Internet using websites?
(A) B2C (B) B2B (C) C2B (D) C2C
(61). Who is an individual customer in B2C E-commerce business model?
(A) Seller (B) Buyers (C) Media (D) Site
(62). Which of the following websites is an example of B2C website?
(A) amazon.com, rediff.com (B) fabmart.com
(C) flipkart.com (D) All the these
(63). On which side of the window in homepage of flipkart.com website are the products displayed category wise?
(A) Left (B) Right (C) Upper (D) Down
(64). Where can you add products from various categories which you want to purchase?
(A) Shopping trolly (B) Shopping cart
(C) Shopping bag (D) Shopping board
(65). Which button is given in flipkart.com to confirm the order?
(A) Order Now (B) Buy Now (C) Place Order (D) Place Now
(66). Which option is now-a-days provided for payment?
(A) Credit card (B) Debit card (C) E-card (D) Payment on Delivery
(67). With whom does B2B enable the businesses to form E-relationship?
(A) Suppliers (B) Distributors (C) Agent (D) All of these
(68). To whom can the manufacturer quickly communicate using B2B about diminishing stock product?
(A) Mediator (B) Supplier (C) Other site (D) Any of these

Mahesh Sir - 9724665284 PAGE NO: 34 App : Clear Code Technical Technical
(69). For which of the following media is B2B business model effective?
(A) Telemarketing, Supply chain (B) Procurement, just-in-time delivery
(C) Online services (D) All of these
(70). Which business model refers to E-commerce activities involving transactions between and among the
consumers?
(A) B2B (B) B2C (C) C2C (D) C2B
(71). Which of the following business models enables the consumers to directly deal with each other through online
auctions and classified advertisements without the involvement of third party?
(A) C2B (B) C2C (C) B2B (D) B2C
(72). What is the form at an auction site if we have any product to sell?
(A) List (B) Icon (C) tool (D) None of these
(73). Which of the following business models involves reverse auctions where the consumers determine the prices
of the products or services?
(A) B2B (B) C2B (C) C2C (D) B2C
(74). Which of the following business models helps in reducing the bargaining time?
(A) C2B (B) B2C (C) B2B (D) C2C
(75). Which of the following is an example of C2B website?
(A) bidstall.com (B) JeetLe.in
(C) A and B both (D) eBay.com
(76). Which business model refers to the services and information provided by the government to the business
organizations through vast network of government websites?
(A) G2C (B) G2G (C) G2B (D) B2G
(77). Which of the following is a website of income tax department of Government of India?
(A) incometaxindia.info (B) incometaxindia.gov.in
(C) incometaxindia.org (D) incometax.gov.in
(78). Which business model is a part of E-governance initiative?
(A) G2C (B) G2B (C) G2G (D) B2B
(79). What is the full form of G2C?
(A) Government to Citizen (B) Government to Customer
(C) Government to Computer (D) Government to Class
(80). Which business model's objective is to provide good and effective services to individual citizen?
(A) G2B (B) G2C (C) G2G (D) B2C
(81). What is the full form of GSWAN?
(A) Gujarat State Wifi Area Network (B) Gujarat Shikshan Wide Area Network
(C) Global Sharing Wide Area Network (D) Gujarat State Wide Area Network
(82). Which information does G2C website provide?
(A) Various government departments
(B) Various welfare schemes
(C) Different application forms to be used by the citizens
(D) All of these
(83). Which type of communication is done in G2G?
(A) Non-commercial (B) Business
(C) Banking (D) Auctions
(84). Which business model refers to online non¬commercial communication between the Government agencies,
organizations and departments with other Government agencies, organizations and departments?
(A) G2B (B) G2C (C) G2G (D) B2G
(85). Which of the following business models is a widely used model?
(A) B2C and B2B (B) G2C and C2B
(C) G2G and G2B (D) C2B and G2B
(86). Who is the consumer in B2B business model?
(A) Consumer (B) Company
(C) Media (D) Mediator
(87). Which of the following is an example for online bookstore?
(A) Amazon (B) Irctc (C) Gmail (D) Yahoo

Mahesh Sir - 9724665284 PAGE NO: 35 App : Clear Code Technical Technical
(88). Which of the following is the process of buying and selling products by offering the customers to bid the
price?
(A) Marketing (B) Auction (C) Bookshop (D) Booking
(89). Which of the following is a feature of traditional commerce?
(A) Operates within a certain period of time or during business hours.
(B) Advertising of the product is done electronically.
(C) E-payments systems are used for receiving payment.
(D) Customers can browse through products and offers.
(90). Which of the following is not an advantage of E-commerce?
(A) Lower cost
(B) Conduct business 24 X 7
(C) Security
(D) No geographical limitations
(91). Which of the following E-commerce business model refers to business and organizations that sell products or
services to consumers over the Internet using websites?
(A) Business to Consumer (B2C) (B) Business to Business (B2B)
(C) Consumer to Business (C2B) (D) Government to Business (G2B)
(92). Which of the following is a good example of C2C model?
(A) Auction sites (B) E-newspaper
(C) Online purchasing (D) Information services
(93). Which of the following E-commerce business model involves reverse auctions where the consumers
determine the prices of the products or services?
(A) Consumer to Business (C2B) (B) Business to Business (B2B)
(C) Consumer to Consumer (C2C) (D) Government to Business (G2B)
(94). Which of the following E-commerce business model refers to online non-commercial communication between
the Government agencies, organizations and departments with other Government agencies, organizations
and departments?
(A) Business to Business (B2B) (B) Consumer to Business (C2B)
(C) Government to Government (G2G) (D) Consumer to Consumer (C2C)
(95). The availability of which of the following has changed the way we used to access information?
(A) Internet (B) Mobile (C) A and B both (D) None of these
(96). What has revolutionized the way business is conducted nowadays?
(A) Telecommunication (B) Telephone
(C) Telegraph (D) Internet
(97). Quality of which of the following is improved by E-commerce as it addresses to the needs of organizations,
merchants and consumers in cutting costs?
(A) Goods (B) Services (C) A and B both (D) None of these
(98). Which are the major areas of business and commercial activities where E-commerce is widely used?
(A) Marketing and Selling, auctions of goods (B) Banking and Insurance
(C) Online information (D) All of these
(99). Why do customers refer to purchase books on Internet?
(A) They do not require to be physically checked.
(B) They can be easily described.
(C) Easily shipped to the customers place little or no damage to them.
(D) All of these
(100). Which is the popular website for online bookstore?
(A) www.yahoo.com (B) www.google.com
(C) www.amazon.com (D) None of these
(101). Which type of newspapers majority of the leading newspapers provide to the readers?
(A) I- newspapers (B) E-newspapers (C) N- newspapers (D) None of these
(102). Which kind of process an auction is?
(A) Only buying (B) Only selling (C) Buying and Selling (D) None of these
(103). Which of the following auctions has limited participation of people?
(A) Traditional (B) Online (C) Offline (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 36 App : Clear Code Technical Technical
(104). To whom do the websites provide a platform, which provides live auctions of goods?
(A) The seller (B) The bidders (C) A and B both (D) None of these
(105). What are you known as when you bid for a product which is placed by other sellers on auctions' website?
(A) Seller (B) Bidder (C) Mediator (D) Buyer
(106). Why is registration required on an online auctions' website?
(A) To track the items you sell or bid on
(B) To determine the winning bids
(C) To build a database of seller and bidder feedback
(D) All of these
(107). What does seller put on an online auctions' website?
(A) Digital picture of the item (B) A brief description about the item
(C) A and B both (D) None of these
(108). When is the item transferred to the bidder?
(A) When the target price is reached (B) When the time limit is over
(C) (A) or (B) (D) None of these
(109). By which do many companies now-a-days conduct their business of marketing and selling of goods and
services?
(A) Radio (B) Magazines (C) Web sites (D) All of these
(110). What do companies provide over Internet for better marketing?
(A) Online catalogue (B) Images (C) Videos (D) All of these
(111). What does a customer get when a ticket is booked?
(A) Copy (B) E-Copy (C) P-Copy (D) Xerox
(112). Which of the following is the most popular site for marketing and selling?
(A) www.homeshopl8.com,www.myntra.com (B) www.flipkart.com
(C) www.makemytrip.com (D) All of these
(113). What does the customer use to pay online on the company's website after receiving bills?
(A) Credit card (B) Net banking (C) A and B both (D) Digital signatu
(114). By whom are Information services provided?
(A) Educational institutes (B) Universities
(C) A and B both (D) Share agents
(115). Which of the following facilities are provided by educational institutes and universities?
(A) Examination results, online enrolment forms (B) Examination schedule, seating arrangement
(C) Important notices (D) All of these
(116). Today, even the simplest products utilise sophisticated electronics. What do they require for maintenance and
support when any problem arises?
(A) Specialised knowledge (B) Technical ability
(C) A and B both (D) None of these
(117). For which type of problems do software companies provide online support to their customers?
(A) Installation (B) Configuration (C) Use (D) All of these
(118). What do the hardware vendors put for their devices on Internet?
(A) Hardware drivers (B) Software drivers
(C) A and B both (D) None of these
(119). When is online banking helpful?
(A) When a customer wants to make an urgent payment without visiting the bank.
(B) When a customer wants to check his account balance without visiting the bank.
(C) A and B both (D) None of these
(120). Which of the following is not possible through net banking?
(A) Transfer the money from one account to other (B) To withdraw money
(C) Obtain statement for any credit or debit (D) None of these
(121). Which are the facilities provided to the customers by Net banking?
(A) Check account balance at any time (B) Find status of transactions
(C) Transfer the money from one account to other (D) All of these
(122). In which of the following fields is Net banking used?
(A) Online shopping (B) Online ticket booking (C) A and B both (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 37 App : Clear Code Technical Technical
(123). What has significantly changed the nature of competition in traditional way of doing business?
(A) E-commerce (B) Commerce (C) Technology (D) Network
(124). Which are the cases in which business processes use traditional activities very effectively and cannot be
improved through technology?
(A) Commercial (B) Non-commercial (C) A and B both (D) Production
(125). Which type of products will the buyers hesitate to buy in E-commerce?
(A) Perishable food items (B) Expensive jewellery
(C) High-fashioned cloth (D) All of these
(126). . Which of the following is a common feature of traditional commerce?
(A) Operates within a certain period of time or during business hours.
(B) No sharing of information with competitors and hiring of sales persons, sales manager and many more.
(C) Location renting or purchasing, advertising, inventory, shipping of products.
(D) All of these
(127). Whose variety over the Internet makes online buying more attractive and convenient?
(A) Goods (B) Services (C) A and B both (D) None of these
(128). When did E-commerce in India grow well as compared to other countries?
(A) Expected late (B) Early
(C) So late (D) Cannot be determined
(129). Which option have the retailers started to give payment for shopping?
(A) Free home delivery (B) Cash on delivery
(C) Delivery at every year (D) None of these
(130). How is the cash-on-delivery mechanism believed from the online retailer point of view?
(A) Profitable (B) Expensive (C) A and B both (D) Easy
(131). Which of the following befits to the customers have in E-commerce?
(A) Availability of goods at lower cost (B) Wider choice
(C) Saves time (D) All of these
(132). Which of the following is an E-commerce advantage?
(A) Conduct business 24 X 7, No boundaries or geographical limitations.
(B) Lower cost, Speed, Team work.
(C) Improved and better customer service, Eliminate travel time and Cost.
(D) All of these
(133). How is the cost of opening a physical store compared to doing business on Internet?
(A) Low (B) Very High
(C) Zero (D) Cannot be determined
(134). Which of the following is not possible through traditional E-commerce?
(A) Businesses to millions of customers (B) wide range of products
(C) Products at lower cost (D) (B) and (C) both
(135). How does business to customers using E-commerce run?
(A) With profit (B) With loss
(C) Quick (D) Slow
(136). What is reduced when we send purchase orders online?
(A) Time (B) Expense (C) A and B both (D) None of these
(137). How is the E-commerce business compared to Traditional commerce?
(A) Slow (B) Medium (C) Very Fast (D) Very slow
(138). Which of the following benefits does E-commerce provide to the society?
(A) Buy from home, office or any place.
(B) Less travelling to purchase a product which further reduces pollution and traffic.
(C) Health care services, Distance learning and education.
(D) All of these
(139). Which of the following investments requires to process business on Internet?
(A) Hardware (B) Software technologies
(C) A and B both (D) None of these
(140). Which type of access does Internet provide?
(A) Local (B) Universal (C) Internal (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 38 App : Clear Code Technical Technical
(141). Which of the following reasons are responsible for dissatisfaction of E-commerce amongst the customers?
(A) Frauds like non-delivery of products.
(B) Incorrect information of the product
(C) Lack of security for payment transactions, how can we return defective goods.
(D) All of these
(142). Which of the following facilities cannot be provided by E-commerce?
(A) To touch (B) To wear (C) To see (D) All of these
(143). Payments in E-commerce are most often conducted using the following.
(A) E-card (B) Credit card (C) Commerce-card (D) All of these
(144). To which of the following does E-commerce depend?
(A) E-mall (B) Internet (C) E-customer (D) Visual things
(145). On which of the following are the business models of E-commerce defined?
(A) Parties involved in E-commerce (B) The provided type of business activities
(C) Services (D) All of these
(146). How many business models have been proposed for E-commerce?
(A) Three (B) Four (C) Five (D) Many
(147). How many Business models of E-commerce are most popular?
(A) Three (B) Four (C) Five (D) Seven
(148). What is the fall form of B2C?
(A) Business to Control (B) Business to Consumer
(C) Business to Commerce (D) Business to Commitment
(149). Which business model is most likely to be seen on Internet?
(A) B2B (B) B2C (C) C2C (D) C2B
(150). Which facilities does B2C include?
(A) Retail selling (B) Online banking
(C) Real estate services, Travel services (D) All of these
(151). Which of the following websites is a popular website for purchasing variety of goods?
(A) flipkart.com (B) irctc.co.in (C) ebay.com (D) gswan.co.in
(152). Which tool is provided at the topmost portion of the flipkart.com website's window to search a particular item
from different categories?
(A) Magnifier tool (B) Search tool (C) Replace tool (D) Locate tool
(153). Which of the following statements is true with reference to shopping cart?
(A) You can add any number of products to the shopping cart.
(B) You can delete a selected product.
(C) You can change the quantity of the product.
(D) All of these
(154). Which information remains to be provided on the final screen by clicking on Place Order button?
(A) Billing address (B) Order summary
(C) Payment options (D) All of these
(155). Which E-commerce business model refers to E- commerce activities between different business partners?
(A) B2B (B) B2C (C) C2C (D) C2B
(156). What is the full form of B2B?
(A) Business to Business (B) Business to Busy
(C) Business to Benefit (D) Buyers to Business
(157). Which business model refers to E-commerce activities between different business partners?
(A) B2B (B) B2C (C) C2C (D) C2B
(158). What gives more efficiency to Business entities involved in B2B?
(A) Less transparency (B) Less communication
(C) More transparency (D) More communication
(159). The companies can improve the efficiency of which of the following activities with the help of B2B?
(A) Supplier management (B) Inventory management
(C) Payment management (D) All of these
(160). Which of the following is an example of B2B website?
(A) commodity.com (B) tradeindia.com (C) A and B both (D) None of thses

Mahesh Sir - 9724665284 PAGE NO: 39 App : Clear Code Technical Technical
(161). What is the full form of C2C?
(A) Consumer to Consumer (B) Consumer to Corrospondance
(C) Consumer to Commitment (D) Certificate to Consumer
(162). Which type of site is a good example of C2C model?
(A) Selling (B) information
(C) Support (D) Auctions
(163). Which of the following is an example of C2C website?
(A) eBay.com (B) olx.com
(C) quikr.com (D) All of these
(164). Which of the following are offered to the customers by the companies?
(A) Products (B) Services (C) (A) or (B) (D) None of these
(165). Which E-commerce model uses internet to reverse the normal buying process?
(A) C2B (B) B2B (C) G2B (D) B2C
(166). If we consider government as a separate entity then mention the business models we have.
(A) G2B (B) G2C
(C) G2G (D) All of these
(167). Which kind of information can a business organization get from G2B website?
(A) Business policies, Approvals for starting the business
(B) Setup requirement
(C) Other specifications
(D) All of these
(168). Which facilities are given on website of income tax department?
(A) All the rules related to tax (B) To fill different forms
(C) To submit online tax returns (D) All of these
(169). What is the full form of G2B?
(A) Global Business (B) Government to Business
(C) Goal Business (D) Government to Benefit
(170). Which of the following makes G2C a part there of?
(A) Business unit (B) E-governance
(C) Business resource (D) All of these
(171). Which network has the Gujarat Government developed as its own network?
(A) GSLAN (B) GSWAN
(C) GSAN (D) GWAN
(172). Which of the following is the Gujarat Government's own website?
(A) gswan.gov.in (B) gswan.in.gov
(C) gswan.guj.in (D) gswan.guj.gov
(173). What is the full form of G2G?
(A) Government to Government (B) Government to Global
(C) Government to General (D) Government to Goal
(174). Between whom is communication done in G2G Business model?
(A) Between the government agencies (B) Between agencies
(C) Between departments (D) All of these
(175). To which of the following does sharing of G2G information help?
(A) Reducing IT costs (B) Streamline procedures
(C) Government offices can be more efficient (D) All of these
(176). What is the major difference between B2C and B2B?
(A) Consumer (B) Company
(C) Media (D) Mediator
(177). Who is the consumer in B2C business model?
(A) Company (B) Mediator
(C) Individual person (D) Media

Mahesh Sir - 9724665284 PAGE NO: 40 App : Clear Code Technical Technical
Introduction To M-Commerce
Total Marks: 6
(1). Which of the following is the use of technologies which provide the location information for business
purpose?
(A) E-commerce (B) M-commerce (C) L-commerce (D) Traditional commerce
(2). Which of the following security aspect refers to the secrecy of the information so that unauthorized user
cannot read it?
(A) Confidentiality (B) Integrity (C) Non-repudiation (D) Authorization
(3). Which of the following security aspect ensures that only authentic users are allowed to use the system?
(A) Authorization (B) Confidentiality (C) Non-repudiation (D) Integrity
(4). Which of the following is a program that uses Internet to record information that passes through a computer or
router in transit from sender to receiver?
(A) Sniffer (B) Denial of service attack (C) Malicious code (D) Spoofing
(5). Which of the following is known as electronic defacing of an existing website page?
(A) Cyber vandalism (B) Denial-of-Service (C) Spoofing (D) Malicious code
(6). Which of the following is a computer program that detects, prevents and takes action to remove the malicious
codes like viruses, worms and trojan horses from the infected system?
(A) Antivirus software (B) Digital certificate (C) Firewall (D) Cryptography
(7). Which of the following is the transformation ot encrypted text back into normal text?
(A) Firewall (B) Digital certificate (C) Decryption (D) Virus
(8). Who developed SSL protocol?
(A) Google (B) Netscape (C) Yahoo (D) Firefox
(9). Which of the following provides the author with a tool to protect his/her original work from being used or
taken by others without permission?
(A) Trademark (B) Copyright (C) Digital watermarking (D) Steganography
(10). Which of the following is the symbol for trademark?
(A) TM, MT and © (B) TM, MS and ® (C) TM, SM and ® (D) TM, SM and ©
(11). Which of the following is a digital code inserted into a digital image, audio or video file which can identify the
file’s copyright information?
(A) Image mark (B) Digital mark (C) Code mark (D) Watermark
(12). Which of the following payment card has a microchip embedded in its surface?
(A) Smart card (B) Debit card (C) Credit card (D) Charge card
(13). Which of the following devices refers to Mobile commerce?
(A) Mobile Phone, Smart Phone (B) Tablet, Palmtop
(C) Personal Digital Assistant (D) All of these
(14). Which facilities does M-commerce provide to the user?
(A) Flexibility and ubiquity (B) Availability and Faster speed
(C) A and B both (D) None of these
(15). What is possible to use by using mobile phone from any place?
(A) Internet (B) Machine (C) Protection (D) Service
(16). Because of Increasing popularity of the following more users are moving towards the use of M- commerce.
(A) Smart phone (B) Tablet (C) A and B both (D) None of these
(17). In which of the following fields is M-commerce used?
(A) Purchasing airline tickets (B) Purchasing movie tickets
(C) Stock market analysis (D) All of these
(18). What is the service known as which banks and other financial institutions provide to the customers who like to
access account balance, stock quotes and then purchase and sell them?
(A) Mobile Banking (B) M-banking (C) Mobile brokerage (D) A and B both
(19). Which of the following field areas have also grown with the demand for mobile related services?
(A) News information (B) Sports, Entertainment
(C) Shopping, Reservation (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 41 App : Clear Code Technical Technical
(20). Which of the following is not merely used to make or receive a call?
(A) Mobile (B) Basic-phone (C) Postal service (D) Courier service
(21). For what are mobile companies coming up with new features?
(A) Smart fun (B) Smart phone (C) Smart man (D) Smart navigation
(22). What do the web design and development companies show to view websites correctly on mobile devices?
(A) Epitomized (B) Invention (C) Optimized (D) All of these
(23). What is managed by M-commerce?
(A) Wireless network (B) Internet (C) A and B both (D) All of these
(24). What does M-commerce provide to the user?
(A) Convenience (B) Alertness (C) A and B both (D) None of these
(25). How do mobile devices enable user to be contacted anytime and anywhere?
(A) Direct (B) Virtually (C) Near (D) Far
(26). Which of the following are benefits of E-commerce?
(A) Reduces transaction cost (B) Reduces time to order
(C) Streamline business processes (D) All of these
(27). What has been made more popular by instant connectivity and availability of faster 3G services?
(A) M-commerce (B) Internet commerce
(C) E-commerce (D) L-commerce
(28). In which of the following fields is M-commerce used?
(A) Mobile marketing and advertising (B) Mobile ticketing
(C) Mobile auctions (D) All of these
(29). Advertising on Internet has become major source of which of the following for most of the portals?
(A) Revenue (B) Profit (C) Expenses (D) Loss
(30). Which of the following tickets users can easily buy using Mobile?
(A) Air (B) Railway (C) Movies (D) All of these
(31). Which of the following are benefits of buying a ticket using Mobile?
(A) Tickets can be easily cancelled. (B) Reducing the traffic and parking problem.
(C) Need not travel to the place for buying tickets. (D) All of these
(32). After providing necessary information by clicking on the undermentioned button the user is provided the list
of trains available on the given date as per his/her requirement.
(A) Ok (B) Finish (C) Find Trains (D) Yes
(33). How can the customer purchase a ticket using mobile device from wherever and whenever he/she goes?
(A) Without being fixed at computer terminal (B) Without being present at the railway station
(C) A and B both (D) None of these
(34). What is the many of the auctions site built to provide access to mobile devices through wireless networks?
(A) Gateways (B) Interface (C) A and B both (D) None of these
(35). For which are the following mobile devices used extensively?
(A) For listening to audio (B) For viewing video
(C) For playing games (D) All of these
(36). Which services do mobiles provide to the customers?
(A) Pay-per-download (B) Pay-per-event
(C) Subscription based services (D) All of these
(37). Which type of shopping does mobile purchase allow to the customers?
(A) Offline (B) Inline (C) Online (D) Outline
(38). About what at the local store the retailer can notify the customers by tracking them?
(A) Shopping (B) Discount (C) Selling (D) Mobile
(39). When can the customer avail the services that are provided by the bank on his mobile?
(A) Before getting registered (B) Till one month after getting registered
(C) After getting registered (D) Till one year after getting registered
(40). Which is the application for mobile services in android market provided by Union Bank?
(A) Umobile (B) Hmobile (C) Dmobile (D) Mmobile
(41). Which of the following is important information of mobile phone during mobile commerce transaction?
(A) Size of the mobile phone (B) Location of the mobile phone
(C) Cost of the mobile phone (D) Type of the mobile phone

Mahesh Sir - 9724665284 PAGE NO: 42 App : Clear Code Technical Technical
(42). Which location-based services does mobile user allow vendors to provide?
(A) Local maps, Local weather (B) Local offers
(C) People tracking and monitoring (D) All of these
(43). With which of the following hand held device there are significant opportunities for the growth of M-
commerce?
(A) PDA (B) Cellular phone (C) Pocket PC (D) All of these
(44). To fulfill requirements of goods and services for whom is the M-commerce enabled?
(A) Buyer (B) Seller (C) A and B both (D ) None of these
(45). What is known as the use of technologies which provide the location information for business purpose?
(A) M-commerce (B) L-commerce (C) E-commerce (D) Internet commerce
(46). What can be tracked by the geographical location of the mobile device?
(A) Location of another person (B) Location of the bank
(C) Location of a restaurant (D) All of these
(47). Which is the most accurate system to determine a mobile device position?
(A) GPS (B) GSP (C) LANs (D) SGP
(48). Within how much area can GPS locate the device?
(A) 100 (B) 200 (C) 500 (D) 700
(49). Which of the following uses signals' intersecting point which is generated by a group of satellite that orbits
around the Earth to locate devices?
(A) GPS (B) RFID (C) SAS (D) NAS
(50). Which of the mobile device signals can be used if the GPS signal is poor, weak or blocked?
(A) Cell tower (B) Wi-Fi hot spot (C) A and B both (D) None of these
(51). Which of the following stored sources are used by the smart phone companies to track the locations of cell
towers and Wi-Fi hot spot?
(A) Web server (B) Worksheet (C) Database (D) ISP server
(52). What should be done to show search results properly?
(A) Calculations of Axis (B) Select
(C) Filter (D) Storage
(53). Using the maps, the location based services track the user's current location indicated in the following colour.
(A) Violate (B) Blue (C) Red (D) Green
(54). Which is the path that the map displays?
(A) Destination to source (B) Only source
(C) Source to destination (D) Only destination
(55). Which type of services do location based services provide to the customer according to their requirement?
(A) Quick, precise (B) Imprecise, slow (C) Slow, improper (D) None of these
(56). Which of the following are examples of location- based services?
(A) Information or directory services (B) Tracking services
(C) Emergency services (D) All of these
(57). . Which of the following is a tracking service?
(A) Tracking of assets (B) Locating friends in a geographical location
(C) Tracking stolen cars, tracking of children by parents (D) All of these
(58). Which of the following is an advertising promotion service?
(A) Targeted advertise (B) Promotional messages
(C) Customer identification in store (D) All of these
(59). Which type of network is Internet?
(A) Personal (B) Public (C) Private (D) Government
(60). The private network may be a following type of network on public network.
(A) With potential threats (B) Unprotected
(C) Serious (D) None of these
(61). Where is the customer information transmitted while shopping form E-commerce website?
(A) Customer's server (B) Merchant's server (C) Third party's server (D) All of these
(62). To which bank does the merchants’ server send customer information for authorization through payment
gateway?
(A) Authorization bank (B) Issuing bank (C) Seller bank (D) Web bank

Mahesh Sir - 9724665284 PAGE NO: 43 App : Clear Code Technical Technical
(63). What is used for payment in E-commerce?
(A) Online Banking (B) Electronic transaction
(C) Credit card and debit card (D) All of these
(64). What is very important on Internet?
(A) Security of data (B) Problems of data (C) Downloading of data (D) Uploading of data
(65). According to which of the following aspects should the E-commerce/M-commerce security must be kept?
(A) Confidentiality (B) Integrity
(C) Authorization and Non-repudiation (D) All of these
(66). How can information be achieved in confidentiality?
(A) Cryptography (B) Decryption (C) Code word (D) Binary text
(67). How can receiver read messages in confidentiality?
(A) Decrypting the message using appropriate key
(B) Encrypting the message using appropriate key
(C) Zip the message using appropriate key
(D) Unzip the message using appropriate key
(68). What is to be told about integrity?
(A) Information is secured. So that unauthorized user can not read it.
(B) Only authentic users are allowed to use the system.
(C) If the message is altered in between transition, it should be detected.
(D) The sender of the message can not deny the sent message.
(69). Which security aspect of E-commerce can prove that the customer has sent the message if the customer
denies of sending a purchase order for any reason?
(A) Confidentiality (B) Integrity (C) Authorization (D) Non-repudiation
(70). Which of the following ensures that the customer does transaction with the authorized owner?
(A) Digital Signatures (B) Trusted Third Party
(C) Protocol (D) A and B both
(71). Which is the code that causes damage to a computer or its system?
(A) Source code (B) Sniffing (C) Malicious code (D) Viral code
(72). What does malicious code work as when user opens an E-mail attachment?
(A) Logic bomb (B) Virus (C) Worm (D) Antivirus
(73). What does Sniffer program record which passes through a computer or router?
(A) Information (B) Protection (C) Encryption (D) All of these
(74). What can sniffer program read?
(A) E-mail message (B) User's login
(C) Password and credit card number (D) All of these
(75). For which type of work to access a denial of service is the user prevented by the attacker?
(A) Accessing E-mail and Websites
(A) Online accounts like banking or other services that rely on the affected computer
(B) Other services which offers to use online account
(C) All of these
(76). How does an attacker create problems in transmission?
(A) By sending thousands of messages to user (B) By hacking user's Network
(C) By changing user's password (D) None of these
(77). Who replaces the website's original content with his/her own content?
(A) An attacker (B) User (C) Network (D) Server
(78). Which content is replaced by offensive material in case of Cyber Vandalism?
(A) Logical (B) Business (C) Physical (D) None of these
(79). Whose identity does the attacker try to assume in spoofing?
(A) Another person (B) Website (C) Webserver (D) A and B both
(80). How does an attacker make fake website?
(A) Substitute their IP address for the real website IP address
(B) By contacting to a creator of real website
(C) A and B both
(D) None of these

Mahesh Sir - 9724665284 PAGE NO: 44 App : Clear Code Technical Technical
(81). Which of the following is a computer program that detects, prevents and takes action to remove the malicious
codes like viruses, worms and trojan horses from the infected system?
(A) Virus (B) Malicious code (C) Antivirus (D) Cyber Vandalism
(82). What does Malicious code do?
(A) Delete the files, Slow down the system
(B) Damage the hardware or destroy the entire computer system
(C) Protect the files
(D) A and B both
(83). To which of the following will an infected system spread to?
(A) Into the programs attached with the system (B) Into files
(C) A and B both (D) None of these
(84). Which is the most common way a system is attacked through?
(A) Network of the system (B) Infected attachments to e-mail
(C) Antivirus (D) Firewall
(85). By which of the following can infection be spread on Internet?
(A) Refreshing (B) Downloading (C) Uploading (D) Reloading
(86). What should the companies having their own websites must keep inside and outside the company network?
(A) Control (B) Restriction (C) Freedom (D) None of these
(87). What is Firewall?
(A) Computer (B) Router (C) A and B both (D) None of these
(88). Which of the following ensures that the company's crucial data is kept safe and not accessed by the intruders?
(A) Antivirus (B) Encryption (C) Firewall (D) Digital Certificate
(89). What are used for our identity in electronic transactions?
(A) Digital certificate (B) Digital ID (C) Digital Card (D) A and B both
(90). With the help of which of the following the business organisations, online services and friends assure that the
electronic information they receive from us are authentic?
(A) Network Certificate (B) Process Certificate
(C) Digital Certificate (D) All of these
(91). What is known as the third party who issues certificates?
(A) Certification dealer (B) Certification anchor
(C) Certification authority (CA) (D) Certification order
(92). Which of the following verify that the certificate is real?
(A) Certificate holder's public key (B) Certificate holder's signatures
(C) Digital signature of the certification authority (D) All of these
(93). Which text is transformed into unreadable or secret key in encryption process using algorithm?
(A) Secret or Cipher text (B) Normal or Plain text
(C) Only textual information (D) None of these
(94). Which key is used for encryption and decryption of a message?
(A) Web key (B) Processor key (C) Secret key (D) A and B both
(95). Which process is the reverse of encryption?
(A) Clear encryption (B) Decryption (C) Visual encryption (D) None of these
(96). Where is encryption used?
(A) Internet, E-commerce (B) Mobile telephone, Bluetooth devices
(C) Automatic Teller Machine of Banks (D) All of these
(97). What is the purpose of encryption of message?
(A) Protection of data (B) Storage of security
(C) Presentation (D) Communication
(98). Which protocol is used for securing web transactions on the Internet?
(A) SSL (B) HTTP (C) IP (D) FTP
(99). Which of the following ensures that the customer communicates with the valid owner?
(A) Digital Certificate(B) Website (C) Protocol (D) Coded word
(100). Which authorities can be known by clicking on Verisign logo?
(A) Information of the authority (A) Certificate
(B) A and B both (C) None of these

Mahesh Sir - 9724665284 PAGE NO: 45 App : Clear Code Technical Technical
(101). Which of the following opportunities do E- commerce and M-commerce provide for doing businesses?
(A) For reaching global market (B) Providing facility of online purchasing
(C) For business processes (D) All of these
(102). Which are the major challenges in E-commerce and M-commerce?
(A) Intellectual Property rights (B) Copyrights
(C) Privacy and disputes among the parties (D) All of these
(103). What confidence does the enforcement of rules and regulations provide to the customers?
(A) Their information remain secret.
(B) Their information will not be misused.
(C) If information is misused responsible party will be punished.
(D) All of these
(104). Which of the following includes intellectual property?
(A) Books, Softwares, Music (B) Video, Copyrights
(C) Trademarks and Webpages (D) All of these
(105). To which of the following is copyright applicable?
(A) Books (B) Software programs (C) Articles (D) All of these
(106). Which of the following only has distribution rights?
(A) Copyright holder (B) Company
(C) User (D) Web company
(107). "Copyright property cannot be used freely." - Specify.
(A) This statement is false. (B) This statement is true.
(C) It depends on property. (D) It depends on owner.
(108). What is used by an individual or a company to distinguish a product or service from that of others on market?
(A) Trademark (B) Copyright (C) Stegnography (D) Domain name
(109). What type of competition does the domain stand, for?
(A) Political (B) Legal (C) Social (D) Financial
(110). What is known as when a domain name is sold to another company at a very high price?
(A) Hyber squatting (B) Cyber squatting (C) Fibre squatting (D) Cyber hacking
(111). For which purpose can the information be used if information in the file is not protected?
(A) Good purpose (B) Malicious purpose (C) A and B both (D) None of these
(112). What can be the hidden information as stegnography?
(A) Plain text (B) Cipher text (C) Images (D) All of these
(113). What is needed for stegnography?
(A) Stegnogrpahy reader (B) Stegnogrpahy writer
(C) Special software (D) Stegnogrpahy card
(114). What did the artists in the past claim by putting a creative sign with the brush in their paintings?
(A) Trade mark (B) Stegnogrpahy (C) Copyright (D) Digital mark
(115). What can an artist create in digital world by hiding their names within the image?
(A) Trade mark (B) Identity (C) Watermark (D) (B) and (C) both
(116). In which form is the unauthorized distribution of digital audio over the Internet a big problem currently?
(A) mp3 (B) wv (C) ogg (D) ogv
(117). What can be done with the photo identity card of a person by writing an identity number'' 12345" and hiding
as a digital watermark in the identity photo?
(A) Protected (B) Visible (C) Transparent (D) Nontransparent
(118). What is the most important aspect of E- commerce?
(A) Registration (B) Payment (C) Selection (D) Storage
(119). Which type of service is E-commerce and M- commerce considered?
(A) Fast (B) Less expensive (C) A and B both (D) None of these
(120). Which cards can be included as the payment cards?
(A) Credit card (B) Debit card (C) Smart card (D) All of these
(121). Which is the most popular and widely accepted methods of payment on Internet?
(A) Credit card (B) Smart card (C) Net banking (D) Charge card
(122). Which of the following is/are examples of credit card?
(A) Master Card ® (B) Visa ® (C) Mcard ® (D) A and B both

Mahesh Sir - 9724665284 PAGE NO: 46 App : Clear Code Technical Technical
(123). Within which limit can the customer spend and pay to the issuing bank?
(A) Credit limit (B) Limit of deposited amount
(C) Unlimited amount (D) It is decided by merchant
(124). Which account do the Merchants need to open with the bank for accepting payments through website?
(A) Web account, Issuing bank (B) Merchant's account, Issuing bank
(C) Business account, Acquiring bank (D) Web account, Acquiring bank
(125). How many parties are involved in credit card transactions?
(A) Two (B) Many (C) Four (D) Three
(126). Specify the work of issuing bank.
(A) It issues credit card to customer. (B) It guarantees the payment to the merchant.
(C) It collects the payment from the customer. (D) All of these
(127). Which of the following plays an important role in online payment?
(A) Payment gateway (B) Payment Processor (C) A and B both (D) None of these
(128). Which of the following payment gateways are services provided by the third parties?
(A) EDI (B) Paypal (C) Digicash (D) Government
(129). Which of the following are data centers which perform the credit card transactions and settle funds to the
merchant?
(A) Payment gateway (B) Processor (C) EDI (D) Web processor
(130). In which parts is the online payment through credit card on internet is divided?
(A) Authorization, Settlement (B) Registration,
(C) Registration, Honesty (D) Credit card limitation.
(131). Where does payment gateway pass the details and transaction information of credit card?
(A) Processor (B) Preprocessor (C) Merchant (D) Online gateway
(132). Where does issuing bank send the status of verification (transaction result like accepted or rejected) after
verification?
(A) Processor (B) Preprocessor
(C) Payment gateway (D) Online gateway
(133). In which of the following steps the amount is transferred from the customer's account to the merchant's
account?
(A) Authorization (B) Settlement (C) Acceptance (D) Perfection
(134). To which bank does the processor send the payment details of the customer?
(A) Web bank (B) Acquiring bank (C) Issuing bank (D) (B) and (C) both
(135). Which bank sends bill to the customer including all the charges?
(A) Merchant bank (B) Issuing bank (C) Web bank (D) Acquiring bank
(136). What do major credit card companies use to secure online transactions?
(A) SET (B) CAT (C) TAT (D) SSL
(137). Which of the following is the limit of the credit card?
(A) They are unsuitable for very small or very large payments.
(B) It cannot be used for excessively large transactions.
(C) A and B both
(D) None of these
(138). By using which card for a purchase should the customer always be aware of his account balance?
(A) Credit card (B) Smart card (C) Debit card (D) All of these
(139). Which information is contained in a smart card?
(A) Account information, cash (B) Health insurance information
(C) User's private information (D) All of these
(140). Which is the form in which information in smart card is stored so that it is much safer than the credit card or
debit cards?
(A) Encrypted form (B) Decrypted form
(C) Analog form (D) None of these
(141). Where are smart cards popular?
(A) U.S., Europe (B) Japan (C) Some parts of Asia (D) All of these
(142). Which of the following cards look similar in appearance?
(A) Smart card (B) Charge card (C) Credit card (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 47 App : Clear Code Technical Technical
(143). What is to be done to the customer if the total amount is not paid back within billing period to the company
who has issued charge card?
(A) Customer has to pay a late fee (B) Card is taken back after paying late fees.
(C) Items are returned back. (D) None of these
(144). What does the bank provide to the customer for shopping and payment from Internet?
(A) E-commerce space (B) Net banking signature
(C) Net banking password (D) Net banking space
(145). Which site is displayed on the screen after selecting bank?
(A) Merchant's (B) Your bank's (C) Third party's (D) All of these
(146). What is found which you can print after successful payment on Indian Railways website?
(A) E-mail of ticket (B) E-copy of ticket
(C) Receipt of deposited money (D) List of trains
(147). What is known as the process of transferring money from one bank account to another account?
(A) Electronic Fund Transfer (B) Web fund-transfer
(C) Commerce-transfer (D) Net fund-transfer
(148). Which of the following is an example of EFT ?
(A) Payment of tuition fees using an ATM
(B) Deposit of employee's salaries in their accounts
(C) Monthly bank account deductions and many more
(D) All of these
(149). . Which are the benefits of EFT?
(A) Simplified bookkeeping (B) Great security
(C) Increased efficiency (D) All of these
(150). What information does E-wallet contain?
(A) Your name, Shipping address (B) Billing address
(C) Credit card information (D) All of these
(151). Which of the following works become easier by the E-wallet?
(A) Shopping (B) Ticket booking (C) A and B both (D) None of these
(152). Which number is customer required to give while paying through E-wallet?
(A) Credit card (B) Debit card (C) A and B both (D) None of these
(153). Who provides E-wallet service today?
(A) Banks (B) Online provision stores (C) Telephone services (D) All of these
(154). Which scheme has IRCTC launched for the customers to make online booking easier?
(A) Smart card (B) Debit card (C) Credit card (D) E-wallet
(155). By which of the following RuPay payment mechanism is launched?
(A) National Public Corporation Of India (B) National Payments Corporation Of India
(C) National Private Corporation Of India (D) National Police Corporation Of India
(156). What is similar to Rupay card in its functioning?
(A) Credit card (B) Debit card (C) A and B both (D) None of these
(157). Which of the following are the world leaders in card payments?
(A) Master card (B) Visa card (C) A and B both (D) E-card
(158). By domestic bank every transaction done using a credit or debit card will be routed to the following outside
the country.
(A) Bank (B) Server (C) Network (D) Customer
(159). Which transactions will be cheaper as the transaction processing will be done domestically through RuPay?
(A) Settlement (B) Transaction cost (C) A and B both (D) None of these
(160). What is SSL?
(A) Protocol (B) Logo (C) Server (D) Router
(161). Which of the following refers to buying and selling of goods or services through the use of Internet enabled
wireless devices?
(A) Internet (B) M-commerce (C) M-banking (D) WWW
(162). Which of the following stands for GPS?
(A) Global Positioning System (B) Global Postal System
(C) Grand Positioning System (D) Google Positioning System

Mahesh Sir - 9724665284 PAGE NO: 48 App : Clear Code Technical Technical
(163). Which of the following security aspect ensures that the information must not be accidentally or maliciously
altered or tampered in transit?
(A) Confidentiality (B) Integrity (C) Non-repudiation (D) Authorization
(164). Which of the following security aspect ensures that the sender of the message cannot deny that he/she has sent
the message?
(A) Authorization (B) Confidentiality (C) Non-repudiation (D) Integrity
(165). Which of the following is an attack used to shut down a machine or network, making it inaccessible to its
intended users?
(A) Malicious code (B) Denial-of-Service (C) Spoofing (D) Cyber vandalism
(166). Which of the following is pretending to be someone you are not, or representing a website as authentic when it
is actually a fake?
(A) Cyber vandalism (B) Malicious code (C) Denial-of-Service (D) Spoofing
(167). Which of the following is the transformation of normal text known as "plain text" into unreadable or secret
text known as "cipher text" using encryption algorithm?
(A) Firewall (B) Encryption (C) Antivirus software (D) Digital certificate
(168). Which of the following is a protocol used for securing web transactions on the Internet?
(A) TCP/IP (B) HTTP (C) Bluetooth (D) SSL
(169). Which of the following starting address indicates that site is secured by SSL protocol?
(A) http:// (B) ssl:// (C) http-ssl:// (D) https://
(170). Which of the following is a specific logo, mark, word, symbol, design, phrase or image which is used by an
individual or a company to distinguish a product or service from that of others in the market?
(A) Trademark (B) Copyright (C) Digital watermarking (D) Steganography
(171). Which of the following is the process of hiding information within other information?
(A) Squatting (B) Steganography (C) Name changing (D) Copyright
(172). Who issues the credit card and guarantees the payment to the merchant?
(A) Merchant (B) Issuing bank (C) Acquiring bank (D) Customer
(173). What is known as Mobile Commerce also?
(A) E-commerce (B) I-Commerce (C) M-commerce (D) Internet Commerce
(174). What is the full form of M-Commerce?
(A) Man Commerce (B) Machine Commerce (C) Mobile Commerce (D) My Commerce
(175). Which type of transactions can a customer conduct by using mobile phone without being fixed at a computer
terminal or being physically present at the shop?
(A) Local transaction (B) Business transaction
(C) Outside transaction (D) Private transaction
(176). Which type of transactions does mobile phone allow while on the move?
(A) Imaginary (B) Unreal (C) abstract (D) Real time
(177). What do bank and other financial institutions use increasingly to retain their business?
(A) E-bank (B) M-commerce
(C) I-Commerce (D) Internet commerce
(178). Which facilities do banks and other financial institutions provide to the customer?
(A) To access account balance (B) Stock quotes
(C) To sale and purchase stocks (D) All of these
(179). What is known as the stock market services offered via mobile devices?
(A) Mobile Brokerage (B) Mobile developing
(C) Mobile task (D) Mobile selling
(180). What is happening with the uses of mobile?
(A) Problem (B) Limitation (C) Growth (D) Complexity
(181). What does M-commerce mean?
(A) Buying goods or services through the use of internet.
(B) Selling goods or services through the use of internet.
(C) A and B both
(D) None of these
(182). What is provided to the user by smart phone?
(A) Ease (B) Flexibility (C) Security (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 49 App : Clear Code Technical Technical
(183). Which of the following is the integration of wireless networks accessed through hand held devices and
Internet?
(A) M-commerce (B) E-commerce (C) Commerce (D) Internet commerce
(184). By which of the following are the benefits of Internet and E-commerce also offered?
(A) L-commerce (B) M-commerce (C) Internet commerce (D) P-commerce
(185). Which activities can be done using Mobile devices?
(A) Shopping (B) Banking (C) To download media files (D) All of these
(186). What can be done in transaction cost using mobile device?
(A) Reduced (B) loss (C) Increased (D) None of thes
(187). Which kind of information can be sent by mobile?
(A) Time based (B) Emergency (C) Animated (D) A and B both
(188). Which of the following is a limitation of M-commerce?
(A) A limited screen size of the hand held devices (A) Limits the types of files and data transfer
(B) Difficult to display video (D) All of these
(189). Which is one of the most popular ways for companies to reach a large audience?
(A) Public (B) News paper (C) Mobile Advertising (D) None of these
(190). An advertisement placed on mobile is based on the following one.
(A) Personal necessity (B) Particular location
(C) Public necessity (D) A and B both
(191). By using which of the following tickets can be easily cancelled on the mobile phones?
(A) Accessing the portals of travel agents (B) By applications
(C) A and B both (D) None of these
(192). For which of the following user can give plan after providing the username and password in irctc.co.in
website?
(A) Source and destination name (B) Date of travel
(C) Ticket type and quota (D) All of these
(193). What is to be sent to the user after booking a ticket?
(A) Ticket via post (B) E-copy of ticket (C) Ticket via courier (D) Any of these
(194). Which of the following is the popular site for auctions?
(A) ebay .in (B) ebuy.in (C) ebom.in (D)ebey.in
(195). Which type of work can the user do using auctions’ sites?
(A) Make a bid (B) Monitor bids
(C) Take a timely action on the bidding process (D) All of these
(196). What is the user supposed to be in mobile online libraries?
(A) Member (B) Authorized (C) Customer (D) Helper
(197). For what should the customers be ready for some type of services?
(A) Purchase (B) Sale (C) Pay (D) Help
(198). On which of the following devices a retailer can send a list of products to the customers in which he is
interested instead of using paper catalogue?
(A) On T.V (B) At home (C) On mobile (D) At shop
(199). What do popular banks and financial institutions provide to their customers via mobile devices?
(A) To access account information (B) Stock purchase
(C) Remit money (D) All of these
(200). Which of the following banking services can be availed via mobile device?
(A) Balance can be checked. (B) Funds can be transferred to any other bank.
(C) Request can be placed for a cheque book. (D) None of these
(201). Which of the following information services is provided to mobile phone users?
(A) News service, Sports news (B) Stock market data, financial records
(C) Location and search services,Traffic information(D) All of these
(202). From which location of mobile users location and search services provide information to the user about nearby
areas shops?
(A) Past (B) Server (C) Current (D) None of these
(203). Which type of information can be obtained by mobile devices?
(A) Particular place (B) Movie theater (C) Restaurant, Hospital (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 50 App : Clear Code Technical Technical
(204). For which of the following M-commerce enabled.
(A) To fulfill buyer's requirement (B) To fulfill seller's requirement
(C) A and B both (D) None of these
(205). What do the applications track in order to deliver a service or product?
(A) User's location (B) Server's location (C) Network's location (D) All of these
(206). The technology uses which location of the mobile device to determine which applications are appropriate in
that area?
(A) Logical (B) Virtual (C) Geographical (D) Server
(207). On which signals does mobile device technology work?
(A) GPS (B) Cellular sources (C) Wi-Fi sources (D) All of these
(208). On which of the following tracking systems is GPS based?
(A) Satellite (B) Telephone (C) Cable (D) Lighting
(209). Which point is used by GPS signals which are generated by a group of satellite that orbits around the Earth to
locate devices?
(A) Union Point (B) Obtuse angle (C) Acute angle (D) Intersecting Point
(210). What is known as that GPS locates the device within 500 meters area?
(A) Oval (B) Rectangle (C) Triangulation (D) Square
(211). Which signals do not broadcast their own locations?
(A) Cell tower (B) Wi-Fi hot spot (C) A and B both (D) None of these
(212). Which of the locations can be found by the stored database of the smart phone companies?
(A) Cell tower (B) Wi-Fi hot spot (C) A and B both (D) None of these
(213). What should be used to find the path to the destination?
(A) Timeline (B) Place line (C) Axisline (D) Maps
(214). How can we find out the destination name from the map?
(A) By typing (B) By speaking (C) A and B both (D) None of these
(215). What does map show to reach to the destination?
(A) Distance (B) Approximate time (C) A and B both (D) None of these
(216). What do location based services offer to provide services that are more quick and precise?
(A) Convenience (B) Opportunity (C) A and B both (D) None of these
(217). About what do the dynamic yellow pages inform the users?
(A) Nearest restaurant (B) Parking facility (C) Traffic updates (D) All of these
(218). Which of the following is an emergency service?
(A) Emergency medical service (B) Emergency ambulance service
(C) Search and rescue mission (D) All of these
(219). What is navigation?
(A) Link between two places (B) Plotting route from one place to another
(C) Link from one place to another (D) Distance between two places
(220). Internet is a public network system that consists of following type of computer networks connected together.
(A) Private (B) Public (C) Government (D) Commercial
(221). Which information does customer need to provide while shopping form E-commerce website?
(A) Credit card number (B) Personal information
(C) Only mobile number (D) A and B both
(222). Where does the merchant's server send the customer information in online shopping?
(A) Payment gateway (B) Processor (C) Preprocessor (D) (A) and (C) both
(223). What can an intruder do from anywhere in the world while sitting on his computer?
(A) Can steal or tamper information
(B) Can create new programs and run them on remote computers causing it to malfunction
(C) Break down in worst cases
(D) All of these
(224). Why does E-commerce/M-commerce have more security issues?
(A) Customer provides his personal and important information about bank
(B) Customer uses online banking, credit card and debit card
(C) A and B both
(D) None of these

Mahesh Sir - 9724665284 PAGE NO: 51 App : Clear Code Technical Technical
(225). How many aspects are there for security in E- commerce and M-commerce?
(A) Three (B) Four (C) Two (D) Five
(226). What does refer to the confidentiality aspect of E-commerce/M-commerce security?
(A) Information is secured. So that unauthorized user cannot read it.
(B) Only authentic users are allowed to use the system.
(C) The information must not be altered in transit.
(D) All of these
(227). . In which form are messages transmitted between two parties in confidentiality?
(A) Encrypted (B) Decrypted (C) Code word (D) Binary text
(228). Which process is useful to protect the confidential data like credit card number?
(A) Decryption (B) Code word (C) Binary text (D) Encryption
(229). Which security aspect of E-commerce ensures that the receiver receives the same message as was sent by the
sender?
(A) Confidentiality (B) Integrity (C) Authorization (D) Non-repudiation
(230). By which are the messages sent by the user accomplished?
(A) Digital signatures (B) Trusted third party (C) A and B both (D) None of these
(231). Which of the following is an Internet Security threat?
(A) Malicious code (B) Sniffing (C) Denial of Service Attack (D) All of these
(232). When can Malicious code be activated?
(A) By itself (A) When user clicks on something
(B) When user opens an e-mail attachment (C) All of these
(233). What does malicious code do when user opens an E-mail attachment?
(A) Steal information (B) cause damage by deleting files
(C) A and B both (D) None of these
(234). What is like using a sniffer program?
(A) Tapping the telephone wire and recording the conversation
(B) Tapping the Internet Wire and recording the conversation
(C) Tapping the Computer Wire and recording the conversation
(D) None of these
(235). Which of the following is an attack used to shut down a machine or network?
(A) Malicious code (B) Sniffing
(C) Denial of service attack (D) Cyber Vandalism
(236). By targeting which of the following does an attacker become able to prevent the user's work?
(A) User's computer (B) User's network connection
(C) Site (D) All of these
(237). Which of the following is the electronic defacing of an existing website page?
(A) Sniffing (B) Spoofing (C) Malicious code (D) Cyber Vandalism
(238). Which type of an electronic equivalent Cyber Vandalism is?
(A) Destroying Property (B) Placing graffiti on someone's photograph
(C) A and B both (D) None of these
(239). What does spoofing mean?
(A) Pretending to be someone
(B) Representing a website as authentic when it is actually a fake
(C) A and B both (D) None of these
(240). In spoofing to which site will all the users who are visiting the real site be redirected to?
(A) Original (B) Public (C) Fake (D) Own
(241). Which of the following are security measures in Internet?
(A) Antivirus software, Firewall (B) Digital certificate, Cryptography
(C) Protocol (SSL) (D) All of these
(242). Which system can easily be targeted by malicious code within a short span of time on Internet?
(A) Virus (B) Antivirus (C) Multi virus (D) Operating
(243). Which of the following works is done by an infection of the code?
(A) Causes strange noise (B) Open pop-up windows
(C) Other annoying works (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 52 App : Clear Code Technical Technical
(244). Which of the following does not replicate within the system?
(A) Virus (B) Worms (C) A and B both (D) None of these
(245). What can be attached to e-mail?
(A) Images (B) Video, Sound clips (C) Any type of files (D) All of these
(246). What should be done with antivirus software after installing it?
(A) Delete (B) Copy (C) Append (D) Update
(247). What is called the most commonly used network protection barrier between the company's network and the
outside world?
(A) I - wall (B) E – wall (C) Internetwall (D) Firewall
(248). Whose primary goal is to keep intruders away from the company's E-commerce infrastructure?
(A) Antivirus (B) Cyber law
(C) Firewall (D) Digital certificate
(249). Against which of the following does a firewall protect the local network?
(A) Email services that sometimes create problems
(B) Undesirable material like photos, videos entering into local network
(C) Unauthorized persons gaining access to local network
(D) All of these
(250). What is required to prove our identity in the real world?
(A) Digital Certificate (B) Driving License
(C) Passport (D) (B) Or (C)
(251). What is issued by a trusted third party to establish the identity of the holder?
(A) Digital certificate (B) Digisign (C) Digital sign (D) All of these
(252). Which of the following information digital certificate contains?
(A) Holder's name (B) A serial number
(C) Expiration dates, message (D) All of these
(253). Which is an art of protecting the information by transforming it into an unreadable form?
(A) Decryption (B) Cryptography (C) Compression (D) All of these
(254). What is known as the text which is transformed from normal or plain text to unreadable or secret text by
encryption algorithm?
(A) Private text (B) Decrypted text (C) Cipher text (D) (A) or (C)
(255). Which of the following does not hide the text but converts it into other text that does not make any meaning?
(A) Encryption (B) Decryption (C) A and B both (D) Web key
(256). To which of the following are messages encrypted before they are sent?
(A) Internet (B) Network (C) (A) Or (B) (D) None of these
(257). What is available in the market for encryption?
(A) Script (B) Algorithm (C) Object (D) Method
(258). What will be the encrypted form of message “Hello” with the help of key “Shift by 1”?
(A) GDKKN (B) IFMMP (C) KGNNQ (D) IELLO
(259). To whom does digital certificate provide authentication?
(A) Merchant (B) Shopper (C) (A) or (B) (D) None of these
(260). Which is the logo that indicates on login site if the site is certified by VeriSign?
(A) Secure (B) https (C) Verisign (D) All of these
(261). The site address starts with the following one rather than http:// when the connection is made to the secured
site.
(A) https:\\ (B) https:// (C) shttp:// (D) shttp:\\
(262). On which level are Activities done on Internet?
(A) National (B) Global (C) District (D) Country
(263). What has Indian government established under IT act?
(A) E Laws (B) I Laws (C) IT Laws (D) TLaws
(264). Give reasons why security is a must in E-commerce and M-commerce?
(A) Customers provide their sensitive information like credit card details.
(B) Companies making online business provide logos or any copyright materials type of digital content.
(C) A and B both
(D) None of these

Mahesh Sir - 9724665284 PAGE NO: 53 App : Clear Code Technical Technical
(265). What is known as the author with a tool to protect his/her original work form being used or taken by others
without permission?
(A) Intellectual property (B) Trade-mark (C) Copyright (D) Confidentiality
(266). Which of the following is protected by copyright law in its various forms?
(A) Intellectual property (B) Business property
(C) Financial property (D) Confidentiality
(267). Which copying violates copyright law?
(A) Web page (B) Book (C) Software program (D) All of these
(268). What is used as trademark?
(A) Logo, mark (B) Word, Symbol (C) Phrase, Image (D) All of these
(269). By which of the following trademark may be designated?
(A) TM (B) ® (C) SM (D) All of these
(270). What did the people do in the past with the domain names that were not in use?
(A) Process (B) Indicate (C) Save (D) Register
(271). Which of the following is a method of protecting intellectual property?
(A) Stegnography (B) Digital Watermarking (C) A and B both (D) None of these
(272). What is used to replace unused data in computer files such as images, sound or text with invisible
information?
(A) Stegnography (B) Digital watermarking (C) A and B both (D) None of these
(273). What is avilable for stegnography on Internet?
(A) Free versions (B) Licensed versions (C) A and B both (D) None of these
(274). Which of the following is a digital code inserted into a digital image, audio or video file which can identify the
file's copyright information?
(A) Trademark (B) Signmark (C) Water mark (D) Digital mark
(275). In which form can information be saved by using watermarking?
(A) Visible (B) Invisible (C) A and B both (D) None of these
(276). How does watermark help to identify the owner of the work?
(A) Visible (B) Invisible (C) Transparent (D) Nontransparent
(277). For which of the following in the field of data security can watermark be used?
(A) Certification (B) Authorization (C) Unauthorizes (D) A and B both
(278). Which of the following photo editor can be used to add digital watermark on any image?
(A) GNU Paint (B) PAINT (C) GIMP (D) DRAW
(279). Which of the following are payment options in E-commerce and M-commerce?
(A) Cash (B) Credit card, Debit card
(C) Smart card, Charge card (D) All of these
(280). what is known as the financial exchange that takes place between the buyer and the seller?
(A) Electronic payment (B) Offline payment
(C) Web payment (D) Net payment
(281). Which term is used for all types of plastic cards that consumers use to make purchases?
(A) Personal card (B) Punch card (C) Payment card (D) Permanent card
(282). Which banks provide the credit cards of the financial institutions which are established and reputed in the
services of credit card business?
(A) Web bank (B) Authorized bank (C) Issuing bank (D) Merchant's bank
(283). What does the credit limit of the customer depend upon?
(A) Credit history (B) Income level (C) A and B both (D) None of these
(284). To whom has the customer to pay by using credit card payment?
(A) Issuing bank (B) Web bank (C) Merchant's bank (D) Authorized bank
(285). Which of the following verification is the authority of customer?
(A) Activeness of card (B) Billing information
(C) Credit limits available to make purchase (D) All of these
(286). Which of the following parties are involved in credit card transactions?
(A) Customer with credit card, Merchant accepting the credit card
(B) Issuing bank
(C) Acquiring bank (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 54 App : Clear Code Technical Technical
(287). Specify the work of Acquiring bank.
(A) It is a financial institution that establishes the account with the merchant.
(B) It validates the credit card information.
(C) Authorizes the sale based on the customer's credit limit.
(D) All of these
(288). Who provides payment gateway services?
(A) Processor (B) Third party (C) EEDI (D) Microsoft
(289). Which of the following connects networks of all the parties involved and enables to perform authorization and
payment in secured manner?
(A) Payment gateway (B) Processor
(C) EDI (D) Web processor
(290). In how many parts is the online payment through credit card on internet is divided?
(A) 1 (B) 3 (C) 2 (D) 4
(291). Where is the credit card information transferred by the website which is provided by the customer at the
checkout time?
(A) Payment gateway (B) Processor (C) Web processor (D) Merchant
(292). To which bank does the processor send the information which is passed from payment gateway?
(A) Issuing bank (B) Acquiring bank (C) Web bank (D) Merchant's bank
(293). Which is the next step if the merchant accepts the transaction?
(A) Authorization (B) Settlement (C) Acceptance (D) Perfection
(294). Where does merchant send the transaction request with all the details?
(A) Processor (B) Payment gateway (C) Preprocessor (D) Online gateway
(295). What is the bank known as where the merchant has an account?
(A) Merchant bank (B) Issuing bank (C) Web bank (D) Acquiring bank
(296). Within which time period does the customer need to pay bill which is sent by the issuing bank?
(A) Within the billing period (B) Any time
(C) Within an year (D) Within a month
(297). Which of the following is an advantage of credit card?
(A) Customers do not carry lot of cash.
(B) Customer can pay both online and offline.
(C) Allows customer to purchase goods even when they do not have the cash available in the bank account
and keeps record of the customer's purchase through the bank statement.
(D) All of these
(298). Which of the following is a kind of payment card that transfers fund directly from the consumer's bank to the
merchant?
(A) Credit card (B) Debit card (B) Smart card (D) All of these
(299). What is embedded in smart card?
(A) Mega chip (B) Peta chip (C) Micro chip (D) All of these
(300). What is available with the merchants who accept smart cards?
(A) Smart card sensor (B) Smart card rewriter
(C) Smart card writer (D) Smart card reader
(301). Show the purpose of using a smart card.
(A) To store digital cash (B) Storing a patient's medical records
(C) A and B both (D) None of these
(302). What is required to read information or add data in smart card?
(A) Smart card sensor (B) Smart card rewriter (C) Smart card writer (D) Smart card reader
(303). Which of the following have not credit limits as compared to credit card?
(A) Smart card (B) Debit card (C) Charge card (D) All of these
(304). Which option is becoming more popular for online payment?
(A) Net banking or Online banking (B) Charge card
(C) Smart card (D) Debit card
(305). What will be asked for payment process after shopping during payment through net banking?
(A) Bank name (B) Your user ID
(C) Net banking password (D) Login password

Mahesh Sir - 9724665284 PAGE NO: 55 App : Clear Code Technical Technical
(306). When is amount transferred from your account to the account of the merchant?
(A) If account number is correct. (B) If net banking password is correct.
(C) A and B both (D) None of these
(307). Which site does Indian railways provide to book tickets online?
(A) irctc.co.in (B) indianrailway.co.in (C) irtcc.co.in (D) railway.co.in.
(308). What does the user need to do first for Indian railways website?
(A) Form should be scanned
(B) To be registered on site
(C) To fill the form by going to railway station
(D) All of these
(309). What can be shown at the time of travel in place of ticket in reference of online railway ticket?
(A) Message which is received from irctc website (B) E-copy of ticket
(C) (A) or (B) (D) None of these
(310). How is Electronic Fund Transfer compared to paper check payments and collections?
(A) Safe (B) Secure
(C) Efficient and less expensive (D) All of these
(311). Which is the least used way of sending and receiving the bills?
(A) Internet (B) Letter (C) Bank (D) Courier
(312). Which type of wallet E-wallet is?
(A) Logical (B) Physical (C) Visual (D) All of these
(313). Why is E-wallet used?
(A) To reduce the work of billing information (B) To reduce the work of payment information
(C) A and B both (D) None of these
(314). Which of the following is the most similar to E-wallet in functioning?
(A) Credit card (B) Debit card (C) A and B both (D) None of these
(315). Why is there not any risk of security compared to credit card/debit card as payment through E- wallet?
(A) It is not necessary to give credit card-debit card number.
(B) Number is much protective
(C) A and B both
(D) None of these
(316). What is known as the card that provides online payment options securely?
(A) Smart card (B) Debit card (C) Credit card (D) E-Wallet
(317). Which term is coined from Rupee and Payment?
(A) Rupee payment (B) RuPay (C) Ru-Py (D) RPay
(318). What is RuPay?
(A) New method of payment through card (B) Payment through E-Wallet
(C) Payment through Credit card (D) Payment through DigiCash
(319). Which bank is not available currently to tie with Master card and Visa card to connect card holders, merchants
and the issuing banks around the globe?
(A) Domestic Indian bank (B) Nationalized bank
(C) Public bank (D) International bank
(320). Which type of alternative does RuPay card serve as?
(A) Local (B) Public (C) Universal (D) None of these
(321). Where is every transaction done by using RuPay card?
(A) India (B) Europe (C) America (D) All over the world
(322). To whom is RuPay more beneficial because it is less expensive?
(A) Customer (B) Bank (C) A and B both (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 56 App : Clear Code Technical Technical
Object – Oriented Concepts
Total Marks: 8
(1). Which of the following best suits to Java?
(A)A procedural programming language (B) An Object-oriented programming language
(C) A Query language (D) All of the above
(2). Which of the following is used to define common features of similar objects?
(A) Class (B) Object (C) Methods (D) All of the above
(3). Which of the following is provided using encapsulation?
(A) Data protection (B) Data sharing
(C) Separation of data and methods (D) All of these
(4). With which of the following options polymorphism cannot be achieved?
(A) Method overloading (B) Operator overloading
(C) Data hiding (D) All of these
(5). An inheritance model refers to which of the following relationships?
(A) ‘is-a’relationship (B) ‘has-a’relationship (C) ‘a-part-of’relationship (D) All of these
(6). Show the era in which rapid applications development and reusability of source code is very important.
(A) Internet (B) Website (C) Web based operations (D) All of these
(7). Which of the following methodologies is proclaimed to be more reliable for developping software?
(A) Procedural Programming (B) Object-oriented Programming
(C) Web Programming (D) All of these
(8). Which of the following year's mid Object-oriented programming become the main programming paradigm
used in creation of new software?
(A) 1980 (B) 1970 (C) 1960 (D) 1950
(9). Which of the following programming languages support object-oriented programming?
(A) C++, Java (B) VB.net, Asp.net (C) C #, PHP (D) All of these
(10). In which of the following programming is our focus levelled on writing functions or procedures which operate
on data?
(A) Procedural (B) Object (C) Web (D) Animation
(11). Which module is mainly focussed in procedural programming for library application?
(A) Student registration (B) Book issue (C) Book return, Fine calculation (D) All of these
(12). Which of the following objects can we think for Library application created using object-oriented
programming?
(A) Student (B) Book (C) Librarian (D) All of these
(13). Which kind of code does the power of object- oriented programming language enable the programmer to
create?
(A) Modular (B) Reusable (C) extendable (D) All of these
(14). What does object-oriented programming use as its fundamental building blocks?
(A) Class (B) Object (C) Method (D) Programmer
(15). How many object properties does an object has?
(A) Three (B) Five (C) Four (D) Two
(16). If any computer language supports four specific object properties called abstraction, encapsulation,
polymorphism and inheritance then what is this language called?
(A) Procedural (B) Object-oriented (C) Structured (D) None of these
(17). State the form in which the object is there.
(A) Physical (B) Abstract (C) A and B both (D) None of these
Mahesh Sir - 9724665284 PAGE NO: 57 App : Clear Code Technical Technical
(18). Which of the following objects are available physically?
(A) Person, Car or coffee cup (B) Date and Time concept
(C) A and B both (D) None of these
(19). Which type of identity do all objects have?
(A) One (B) Unique
(C) Started with same number (D) Started with same symbols
(20). What is known as the value of attributes which we use to identify the object?
(A) Property (B) State (C) Caption (D) Validation
(21). Behaviour is known as the following one.
(A) Caption (B) Alias (C) Method (D) Design
(22). In which of the following terms can objects be described in “real” world?
(A) Identity (B) State (C) Behaviour (D) All of these
(23). The data attributes and behavioural methods associated with an object are referred as following.
(A) Member (B) Feature (C) (A) or (B) (D) None of these
(24). Which concept does object-oriented system use?
(A) State (B) Class (C) Property (D) Attribute
(25). Which of the following is a template for multiple objects with similar features?
(A) Class (B) State (C) Field (D) Method
(26). Which type of group of objects a class is?
(A) With similar attributes and common behaviour
(B) With different attributes
(C) With different behaviour
(D) None of these
(27). What is going to be considered for each individual, if we have a class named 'Person' describing common
attributes and behaviour of all persons?
(A) Object (B) State (C) Behaviour (D) Property
(28). Which of the following represents a collection of classes, constraints and relationship among classes?
(A) Object-diagram (B) Memory-diagram (C) Class-diagram (D) Field-diagram
(29). What is the full form of UML?
(A) Unicode Mixer Language (B) Unicode Main Language
(C) Unified Modelling Language (D) Unified Main Language
(30). What can be used to create models of object- oriented software?
(A) XML (B) OMG (C) UML (D) DHTML
(31). Which of the following languages is a visual modelling language?
(A) UML (B) HTML (C) XML (D) DHTML
(32). What is the full form of OMG?
(A) Object Management Group (B) Object Master Group
(C) Onscreen Management Group (D) Open Management Group
(33). Which of the following software specifies several diagrams for representing different aspects of a software
application?
(A) URI (B) URL (C) UML (D) ULM
(34). What is class-diagram?
(A) Diagrams (B) Steps (C) Symbols (D) (B) and (C) both
(35). In how many sections is a rectangle which is used to represent a class split?
(A) Five (B) Four (C) Three (D) Two
(36). Which of the following bracketted items are optional in UML notation?
(A) <> (B) [] (C) () (D) {}

Mahesh Sir - 9724665284 PAGE NO: 58 App : Clear Code Technical Technical
(37). Which type of visibility can be there in syntax of UML notation?
(A) Private (B) Protected (C) Public Or Package (D) All of these
(38). Which item is mandatory and all other items are optional in syntax of attribute?
(A) Data type (B) Initial value (C) Attribute name (D) A and B both
(39). Which of the following syntax is used to declare a variable Gender with initial value 'M'?
(A) Gender : String = ‘M’ (B) Gender : Char = ‘M’
(C) Gender Char = ‘M’ (D) Gender: Char as = TVT
(40). UML diagrams are not dependent on the following.
(A) on the Programming language used for coding an application
(B) on how many attributes to be used
(C) on how many classes to be used
(D) None of these
(41). How are the objects?
(A) Static (B) Dynamic (C) (A)or(B) (D) None of these
(42). Which are two elements of any computer program?
(A) Data (B) Functions (C) A and B both (D) None of these
(43). As how many entities does object-oriented programming view to data and functions?
(A) Two (B) Three (C) One (D) Many
(44). By which of the following a problem of modification of data can be solved in object- oriented programming?
(A) Encapsulation (B) Data-Abstraction
(C) Polymorphism (D) Inheritance
(45). What type of encapsulation is possible by wrapping data and methods into a class?
(A) public (B) protected (C) private (D) multi
(46). “Private members of the class are not available directly to outside world” - Specify this statement.
(A) This statement is true. (B) This statement is false.
(C) It depends on class. (D) It depends on data.
(47). Which of the following keeps the data safe from unintended actions and inadvertent access by outside objects?
(A) Abstraction (B) Encapsulation (C) Polymorphism (D) Aggregation
(48). Which of the following programming techniques is an opposite kind of technique than the procedural
programming?
(A) script (B) object (C) web (D) animation
(49). Which of the following is a process of representing the essential features of the objects without including
implementation details?
(A) Polymorphism (B) Encapsulation (C) Data-Abstraction (D) Messaging
(50). By which of the following functions data-abstraction concept can be understood in C programming?
(A) sqrt(25) (B) printf("Hello") (C) A and B both (D) None of these
(51). What does data-abstraction provide us to use?
(A) Skeleton (B) Template (C) A and B both (D) None of these
(52). Which of the following is hidden in data- abstraction?
(A) Abstract behaviour of the data type
(B) Details of how the behaviour of the data type is implemented
(C) A and B both
(D) None of these
(53). In which of the following do we simply define a data type and a set of operations on it?
(A) OMG (B) DTA (C) ADT (D) OOP
(54). Which of the following protects data by making them inaccessible from outside?
(A) Encapsulation (B) Abstraction (C) Messaging (D) Polymorphism

Mahesh Sir - 9724665284 PAGE NO: 59 App : Clear Code Technical Technical
(55). What is referred as a call to a method in object- oriented terminology?
(A) Polymorphism (B) Abstraction (C) Encapsulation (D) Message
(56). “Different classes may have same methods with same name.” Specify this statement.
(A) This statement is true. (B) This statement is false.
(C) It depends on class. (D) It depends on method.
(57). What is called as different forms of single method or operation?
(A) Encapsulation (B) Data-Abstraction (C) Polymorphism (D) Messaging
(58). “Is it possible to define more than one function with same name in object oriented programming.” - Which of
the following is a true answer of this question?
(A) It is possible as long as the methods differ in signatures.
(B) It is possible when signature is not defined.
(C) A and B both
(D) None of these
(59). What does signature mean?
(A) Number of parameters (B) Type of parameter
(C) A and B both (D) None of these
(60). Object-oriented programming allows to define more than one method having same name but different
signatures in a single class.What is known as this characteristic?
(A) Function (B) Method overloading (C) (A) Or (B) (D) None of these
(61). In object-oriented programming same operation is given different meanings depending upon the data type of
operands used. By what can this type of Polymorphism be achieved?
(A) Aggregation (B) Operator overloading (C) Data-Abstraction (D) Encapsulation
(62). What is called the capability of using same names to mean different things in different context in general?
(A) Overloading (B) Aggregation (C) Composition (D) Encapsulation
(63). Which relationship does aggregation or composition represent between different classes?
(A) has-a (B) a-part-of (C) (A) or (B) (D) None of these
(64). Which attributes will a class contain when we define a class 'computer'?
(A) Motherboard (B) Screen (C) A and B both (D) None of these
(65). Which of the following represents exclusive relationship between two classes?
(A) Aggregation (B) Polymorphism (C) Encapsulation (D) Composition
(66). With which symbol is aggregation represented in class-diagram?
(A) Symbol of an empty diamond (B) Symbol of a filled diamond
(C) Symbol of an empty triangle (D) Symbol of a filled diamond
(67). What is known as the class when it is contained in owner class?
(A) Subject Class (B) Part Class (C) Aggregated Class (D) All of these
(68). Which class is an example of aggregated class when Person class has Name and Address class?
(A) Person (B) Address (C) Name (D) (B) & (C) both
(69). What is called an existing class in object-oriented terminology?
(A) Super class (B) Parent class (C) Base class (D) All of these
(70). Which feature provides reusability where existing methods can be reused without redefining?
(A) Aggregation (B) Inheritance (C) Composition (D) Encapsulation
(71). By using arrow pointing to which class in class- diagram is inheritance represented?
(A) Super (B) Sub (C) Child (D) Derived
(72). Which relationship refers between two classes where one class is a specialized version of another class?
(A) Polymorphism (B) Inheritance (C) Abstraction (D) Encapsulation
(73). Which of the following class is a specialized version with additional attributes and methods?
(A) Super (B) Base (C) A and B both (D) Sub

Mahesh Sir - 9724665284 PAGE NO: 60 App : Clear Code Technical Technical
(74). Which of the following is an example of multilevel inheritance?
(A) Person <— Employee <— Teacher (B) Computer <— Mother board <— Model
(C) A and B both (D) None of these
(75). Which type of relationship exists between superclass and subclass in inheritance?
(A) ‘a kind of’ (B) ‘multi kind of’ (C) ‘different kind of’ (D) None of these
(76). In which of the following classes do not inherit from other classes, but are composed of other classes?
(A) Inheritance (B) Aggregation (C) Polymorphism (D) Composition
(77). What is represented using class-diagram?
(A) Relationship (B) Constraints (C) A and B both (D) None of these
(78). On which of the following two does focus lie in object-oriented programming?
(A) Data and Animation (B) Networking and Animation
(C) Data and functionality (D) Animation and Functionality
(79). Which of the following together can a class encapsulate as a template that can be shared by all objects?
(A) Attribute (B) Method (C) A and B both (D) None of these
(80). What is a relationship called when there is 'has- a' or 'a-part-of' relationship between two classes?
(A) Aggregation (B) Composition (C) (A) or (B) (D) Polymorphism
(81). Which of the following represents exclusive relationship between two classes?
(A) Aggregation (B) Composition (C) Encapsulation (D) Polymorphism
(82). Which type of features are implemented in subclass in inheritance?
(A) Common (B) Special (C) A and B both (D) None of these
(83). In Object-oriented methodology, the focus is on which of the following entities?
(A) Data (B) Functions (C) Objects (D) All of the above
(84). Which of the following is used to distinguish objects from each other?
(A) Attributes (B) State (C) Behaviour (D) All of the above
(85). Which of the following is not a visibility symbol?
(A) ~ (B) * (C) # (D) -
(86). Which of the following is enabled by data abstraction?
(A) Data protection
(B) Data hiding
(C) To hide implementation details of method manipulating the data
(D) All of these
(87). An aggregation model refers to which of the following relationships?
(A) ‘Has-a’relationship (B) ‘is-not-a’relationship
(C) ‘a-part-of’relationship (D) All of these
(88). In class diagram,composition is represented using which of the following symbols?
(A) Empty diamond symbol (B) Filled diamond symbol
(C) Empty triangle symbol (D) All of these
(89). Which of the following plays significant role in analysis, design and impementation of software system?
(A) Object-oriented techniques (B) Methodology
(C) (A) or (B) (D) None of these
(90). When did Object-oriented programming start?
(A) 1980 (B) 1970 (C) 1960 (D) 1950
(91). For which of the following purposes object- oriented technology was developed?
(A) To handle the rapidly increasing size and complexity of software systems
(B) To make it easier to modify these large and complex systems over time.
(C) (A) and (B) both
(D) None of these

Mahesh Sir - 9724665284 PAGE NO: 61 App : Clear Code Technical Technical
(92). In which of the following categories can the programming be divided?
(A) Structure / Procedural Programming (B) Object-oriented Programming
(C) (A) and (B) both (D) None of these
(93). Where do we focus while writing the following for procedural programming?
(A) Functions (B) Procedures (C) A and B both (D) None of these
(94). Which of the following does object contain in object-oriented programming?
(A) Data and Distribution (B) Data and Functionality
(C) Link and Distribution (D) None of these
(95). What should we need to think with the objects in object-oriented programming language?
(A) Association between objects (B) About maximum objects
(C) About minimum objects (D) None of these
(96). What is gained by being able to change or replace modules without disturbing other parts of code?
(A) Variability (B) Selection (C) Flexibility (D) Attraction
(97). Which of the following concepts is used to classify similar objects?
(A) Class (B) Method (C) Property (D) Attribute
(98). Which properties is the object provided by object- oriented language?
(A) Abstraction (B) Encapsulation
(C) Polymorphism and Inheritance (D) All of these
(99). In the “real” world, which of the following is the entity the world is comprised of?
(A) Class (B) Property (C) Attribute (D) Object
(100). What does ‘abstract’ mean?
(A) It cannot be touched (B) It cannot be seen
(C) A and B both (D) None of these
(101). Which of the following objects may be in abstract form?
(A) Person, Car (B) Date and Time concept (C) A and B both (D) None of these
(102). What are the characteristics known as by which objects can be distinguished by each other?
(A) Property (B) Attribute (C) (A) or (B) (D) None of these
(103). An object is associated with the following one.
(A) Behaviour (B) Template (C) Network (D) Web
(104). By what can the following values of objects be changed?
(A) Behaviour (B) Connection (C) Mount (D) Design
(105). What are the attributes referred which describe the object in object-oriented programming?
(A) Data field (B) Property (C) Caption (D) ID
(106). By what do objects differ from each other when they possess same characteristics and behaviour?
(A) State (B) Sub sections (C) Internal sections (D) None of these
(107). For which can class be considered as a blueprint?
(A) for various values of state (B) for various objects
(C) for only one object (D) None of these
(108). With which kind features a class is a template for multiple objects?
(A) Different (B) Similar (C) Same-Five (D) Same-Two
(109). Which kind of semantic purpose objects in the same class has?
(A) Different (B) Same (C) Improper (D) Irrespective
(110). By what is each object identified?
(A) Symbol (B) State (C) ID (D) None of these
(111). What does class-diagram represent?
(A) A collection of classes (B) Constraints
(C) Relationship among classes (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 62 App : Clear Code Technical Technical
(112). What can be used to create models of object- oriented software?
(A) XML (B) HTML (C) UML (D) DHTML
(113). What is helpful to design an application?
(A) Models of software (B) Founder of the software
(C) Developer of software (D) None of these
(114). By which of the following Unified Modelling Language (UML) is defined?
(A) OMG (B) OML (C) LMO (D) GOM
(115). Which kind of language UML is?
(A) Web designing language (B) Web developing language
(C) Visual modeling language (D) Animation language
(116). Which of the following has the purpose to model the static view of an application?
(A) Cryptography (B) Compressed-diagram
(C) Class-diagram (D) Data-diagram
(117). With which icon a class is represented in class- diagram?
(A) Square (B) Parallelogram (C) Rectangle (D) Round
(118). In which sections is a rectangle which is used to represent a class split?
(A) Name (B) Attribute (C) Behavior (D) All to these
(119). In which brackets in UML notation is the user supposed to specify the values for items enclosed?
(A) <> (B) [] (C) () (D) {}
(120). What does attribute refer to generally?
(A) Data type (B) variable (C) Value (D) Constant
(121). Which of the following syntax is true to declare a variable balance as private and with initial value 0.0?
(A) + Balance: Float = 0.0 (B) ~ Balance: Float=0.0
(C) - Balance : Float = 0.0 (D) # Balance : = 0.0
(122). What can be specified depending on whether parameter is read only or not?
(A) Input (B) Output (C) (A) or (B) (D) None of these
(123). With what are objects represented during execution of an application?
(A) state (B) symbol (C) code (D) None of these
(124). As which of the following are class objects also known as?
(A) Instance (B) Method (C) Behaviour (D) None of these
(125). In which of the following programming are data and functions separate entities?
(A) Object-oriented (B) Structured (C) Animation (D) Web based
(126). In which of the following programming data can be altered by any component of the program?
(A) Object (B) Procedural (C) Animation (D) Web
(127). Which mechanism provides protection to data and methods of a program?
(A) Encapsulation (B) Data-Abstraction (C) Polymorphism (D) Inheritance
(128). What is known as the wrapping of data and methods into a single unit?
(A) Class (B) Object (C) Field (D) Encapsulation
(129). Which method is used to make data available to the outside world?
(A) private (B) public (C) multi (D) single
(130). In procedural programming which type of data areas are often used for sharing information?
(A) private (B) common (C) single (D) multi
(131). Which of the following statements is true for object-oriented programming?
(A) Only the object that “owns” the data can change its content.
(B) Other objects can view it.
(C) Other objects can change this data by sending message to the “owner”.
(D) All of these

Mahesh Sir - 9724665284 PAGE NO: 63 App : Clear Code Technical Technical
(132). Which of the following is a concept that hides the complexity?
(A) Polymorphism (B) Encapsulation (C) Data-Abstraction (D) Messaging
(133). What does a user defined function with necessary input data parameters provide?
(A) Polymorphism (B) Encapsulation (C) Data-Abstraction (D) Class
(134). What does data-abstraction maintain visible?
(A) Abstract behaviour of the data type
(B) Details of how the behaviour of the data type is implemented
(C) A and B both
(D) None of these
(135). Which of the following is an example of data- abstraction?
(A) Abstract Data Types or structures in C/C++ (B) Classes in C++/Java
(C) A and B both (D) None of these
(136). What is the full form of ADT?
(A) Abstract Data Types (B) Abstract Date Types
(C) Advanced Data Types (D) Abstract Dynamic Types
(137). Which of the following enables to represent data in which the implementation details are hidden?
(A) Encapsulation (B) Abstraction (C) Messaging (D) Polymorphism
(138). Due to which of the following all method calls are handled by objects that recognize the method?
(A) Polymorphism (B) Abstraction (C) Encapsulation (D) Message
(139). What does polymorphism mean?
(A) Many forms (B) different forms (C) (A) Or (B) (D) None of these
(140). “Is it possible to define more than one function with same name in some programming languages.” Which of
the following is a true answer of this question?
(A) Yes (B) No (C) It depends on OS (D) It depends on user
(141). Which type of functions can be defined more than one time with same name in object oriented
programming?
(A) Methods same in signatures. (B) Methods differ in signatures.
(C) A and B both (D) None of these
(142). We have written a function named 'Max' that takes two integers as parameters and returns maximum as
integer value and one more function named 'Max' that finds maximum of integer elements stored in an
array. What is known as this creation?
(A) Encapsulation (B) Polymorphism (C) A and B both (D) None of these
(143). Which of the following object-oriented programming allows writing expression using operators?
(A) Object (B) Class (C) Function (D) Template
(144). By which of the following overloading is polymorphism possible?
(A) Function overloading (B) Operator overloading
(C) A and B both (D) one of these
(145). What is called when objects of one class are composed of other class?
(A) Aggregation (B) Composition (C) (A) or (B) (D) Overloading
(146). A computer screen is a class with following attribute?
(A) length (B) width (C) model (D) All of these
(147). Which of the following represents non-exclusive relationship between two classes?
(A) Aggregation (B) Polymorphism (C) Encapsulation (D) Abstraction
(148). How much is the object class affected when an object of aggregation class is deleted in composition?
(A) It will not be deleted. (B) It will be deleted.(C) It depends on object. (D) It depends on class.
(149). What is known as the class when it contains object of other class?
(A) Owner Class (B) Whole Class (C) Aggregating Class (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 64 App : Clear Code Technical Technical
(150). Which class is an example of aggregating class when Person class has Name and Address class?
(A) Person (B) Address (C) Name (D) All of these
(151). Which of the following is referred to as 'is-a- kind-of' relationship between two classes?
(A) Aggregation (B) Inheritance (C) Composition (D) Encapsulation
(152). Which relationship is appropriate when one class is a kind of other class?
(A) ‘is - a - kind - of ’ (B) ‘multi - kind - of ’ (C) ‘multi level - kind - of’ (D) None of these
(153). What is called a new class in object-oriented terminology?
(A) Subclass (B) Child class (C) Derived class (D) All of these
(154). Choose the data attributes and methods of the class that are available to objects in the subclass without
rewriting their declaration.
(A) Super (B) Sub (C) Child (D) Derived
(155). What can be done in sub class?
(A) New data can be added. (B) New members can be added.(C) A and B both (D) None of these
(156). “Inheritance allows the methods to be redefined in subclass as per need.” Specify this statement.
(A) This statement is true. (B) This statement is false.
(C) It depends on object. (D) It depends on class.
(157). By using which type of pointing to superclass in class-diagram is inheritance represented?
(A) Line (B) Arrow (C) An empty diamond (D) A filled diamond
(158). Which of the following is a class-diagram if teacher class is created in Person class?
(A) Person —> Teacher (B) Person <— Teacher (C) Person <> Teacher (D) Person <> Teacher
(159). In which of the following class are common attributes and methods defined?
(A) Sub (B) Child (C) A and B both (D) Super
(160). When one class is derived from second class and second class is derived from third class; State what it is
known as.........
(A) Level inheritance (B) Multilevel inheritance (C) Inner inheritance (D) Nested inheritance
(161). In which classes does ' a-kind-of' relationship exist in inheritance?
(A) Masterclass and Superclass (B) Masterclass and Subclass
(C) Superclass and Subclass (D) Subclass and Subclass
(162). Which of the following statements is true for inheritance?
(A) Allows to share functionality of class (B) Allows to reuse functionality of class
(C) Extend functionality (D) All of these
(163). By which of the following is class made in composition?
(A) By other class (B) Inherited (C) (A) or (B) (D) None of these
(164). In which of the following does object-oriented methodology play significant role?
(A) Analysis of software system (B) Design
(C) Implementation (D) All of these
(165). Which of the following encapsulates attributes (data) and methods (behaviour or functionality) together as a
template that can be shared by all objects?
(A) Class (B) Inheritance (C) Super object (D) Sub object
(166). Which of the following are distinguished by their state?
(A) Class (B) Object (C) Data (D) Field
(167). Which of the following represents non-exclusive relationship between two classes?
(A) Aggregation (B) Composition (C) Encapsulation (D) Polymorphism
(168). Which type of features are implemented in superclass in inheritance?
(A) Common (B) Special (C) A and B both (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 65 App : Clear Code Technical Technical
Java Basics
Total Marks: 10
(1). Most of the java .................. is/are very similar to C Language.
(A) Coding (B) Logic (C) Syntax (D) Operators
(2). .................. language is considered to be the ideal language for distributing the executable programs via the
World Wide Web.
(A) C (B) VB.Net (C) Java (D) All of these
(3). In java, .................. provides the basic data types, system inputs and output capabilities.
(A) packages (B) class libraries (C) Both (A) & (B) (D) None of these
(4). Java programming language is the platform .................., which provides the capability of being moved
easily from one computer system to another.
(A) dependent (B) independent (C) relevant (D) irrelevant
(5). Program written in Java are compiled into machine language for a compute that doesn’t really exist;
which is known as ..................
(A) JSP (B) JRE (C) JDK (D) JVM
(6). The disadvantage(s) of Bytecode of Java is: ..................
(A) Its slow execution speed (B) its compiler is too slow
(C) It is not user friendly (D) All of these
(7). At least one class of java program must have the ..................method.
(A) main (B) java (C) parent (D) common
(8). ................. Names are case sensitive in Java programming.
(A) class (B) file (C) Both (A) & (B) (D) None of these
(9). The java program can be compiled using the .................. compile command.
(A) java (B) javac (C) compile (D) javax
(10). The class access specifier of the main method class should always be ..................
(A) public (B) private (C) protected (D) None of these
(11). In Java, .................. is the first routine that is run when the program is executed.
(A) main (B) class (C) parent (D) common
(12). The .java extension is refers to ..................
(A) Java Compiler (B) Java Source File (C) Java Bytecode File (D) Java Interpreter
(13). The javac command is refers to ..................
(A) Java Compiler (B) Java Source File (C) Java Bytecode File (D) Java Interpreter
(14). .................. are not compiled or interpreted in Java programming.
(A) Markers (B) Indicators (C) Comments (D) Bookmarks
(15). The .............. command adds a linefeed after the end of the information that it displays the results on the
screen.
(A) System.out.print (B) System.out.println
(C) Both (A) & (B) (D) None of these
(16). Using .................. editor Java application can be created.
(A) SciTE (B) Notepad++ (C) PSPad (D) All of these
(17). Using SciTE, java program can be executed from .................. menu.
(A) Run (B) Edit (C) Tools (D) Compile
(18). Java program can be executed from .................. menu using SciTE.
(A) Tools-->Go (B) Compile-->Go (C) File-->Go (D) Run-->Go
(19). Java is a ................. language, in context to formatting of instructions.
(A) free format (B) case format (C) rigid format (D) formatting
(20). Which of the following statement(s) is/are correct in context to layout of Java program?
(A) The compiler of java doesn’t care about the program layout.
(B) We can write an entire program together in a single line also
(C) Both (A) & (B)
(D) None of these
Mahesh Sir - 9724665284 PAGE NO: 66 App : Clear Code Technical Technical
(21). Which of the following statement(s) is/are correct in context to Data type(s) in Java?
(A) It determines the required memory size.
(B) It determines the range of values.
(C) It determines the types of operations that can be performed.
(D) All of these
(22). There are .................. number of data types in java that can hold the integer numbers.
(A) two (B) three (C) four (D) five
(23). Which of the following data types is an integer type?
(A) short (B) float (C) double (D) None of these
(24). Which of the following data types is not an real type?
(A) float (B) long (C) double (D) None of these
(25). .................. data type holds one of the two logical values; true or false.
(A) logical (B) boolean (C) Both (A) & (B) (D) None of these
(26). The primitive data types are ..................
(A) Machine independent (B) machine dependent
(C) Both (A) & (B) (D) None of these
(27). Choose the correct option for “Match the following”; data types with their respective range.
(A) byte : i) -32768 to 32767 (B) short : ii) -92233720368775808 to 92233720368775807
(C) int : iii) -128 to 127 (D) long : iv) -2147483648 to 2147483647
(A) A-iv, B-ii, C-I, D-iii (B) A-iii, B-i, C-Iv, D-ii
(C) A-ii, B-i, C-Iv, D-iii (D) none of these
(28). Real numbers in Java are complaint with .................. standard.
(A) ANSI (B) IEEE 754 (C) ASCII (D) All of these
(29). Which of the following is correct; in context to Variables in Java?
(A) Its name should not start with a numerical value.
(B) It should not contain space in its name.
(C) Its name should not be a reserved word of Java.
(D) All of these
(30). Which of the following is the valid variable name in java?
(A) India@1947 (B) 1947_India (C) India 1947 (D) None of these
(31). Which of the following is the valid variable name in java?
(A) Void (B) Public (C) Static (D) All of these
(32). Which of the following is the valid variable name in Java?
(A) birth date (B) dob (C) Both (A) & (B) (D) None of these
(33). Which of the following is not a kind of variable in Java?
(A) Instance Variable (B) Local Variable
(C) Class Variable (D) None of these
(34). A name used for a constant value is known as ..................
(A) Literal (B) Data Type (C) Variable (D) Comment
(35). In java, .................. literals are whole numbers.
(A) Real (B) Integer (C) String (D) All of these
(36). A user can force a smaller number to be a long by appending an ................. as a suffix to the number.
(A) L or l (B) N or n (C) H or h (D) F or f
(37). In Java, a numeric literal with a leading 0x or 0X is interpreted as an ................. number.
(A) Binary (B) Octal (C) Hexadecimal (D) Decimal
(38). Which of the following literals is real number literal?
(A) 054 (B) 54 (C) 0x54 (D) 54.0
(39). Which of the following literals is Hexadecimal number literal?
(A) 054 (B) 54 (C) 0x54 (D) 54.0
(40). In Java, scientific format can be used to express the ..................
(A) very large numbers (B) very small numbers
(C) Both (A) & (B) (D) None of these
(41). .................. literals are expressed by a single character surrounded by a single quote.
(A) Character (B) String (C) Both (A) & (B) (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 67 App : Clear Code Technical Technical
(42). Choose the correct option for “Match the following”; Escape code with their meanings.
(A) \n : i) Carriage Return (B) \t : ii) New Line (C) \b : iii) Tab (D) \r : iv) Backspace
(A) A-iv, B-ii, C-I, D-iii (B) A-iii, B-iv, C-I, D-ii
(C) A-ii, B-iii, C-iv, D-i (D) None of these
(43). In Java, String is the predefined .................. type.
(A) Primitive (B) Object (C) Data (D) Variable
(44). In Java, .................. comment starts with double slash( //) and extends till the end of line.
(A) Single Line (B) Multi Line (C) Documentation (D) All of these
(45). In Java, .................. comment begins with /** and ends with */.
(A) Single Line (B) Multi Line (C) Documentation (D) All of these
(46). The variable name like “balanceAmount”, “bankBalance”, “callCost”, etc. used the upper case letter in the
middle. What type of case of this name is referred in java?
(A) Sentence case (B) Toggle Case (C) Camel Case (D) Giraffe Case
(47). Basic addition(+), subtraction(-), multiplication(*), division(/) and modulus(%)are ……………………
operators in java.
(A) Basic (B) Mathematic (C) Arithmetic (D) None of these
(48). Which of the following operator cannot be used as unary operator also in Java?
(A) * (B) % (C) / (D) None of these
(49). Which of the following operator can be used to concatenate a string in Java?
(A) + (B) * (C) % (D) None of these
(50). The ++ operator is used after variable; e.g. a++; is also termed as ……………………
(A) Post increment (B) Pre increment (C) Real Increment (D) None of these
(51). If the value of x = 5 and y= 4 + x++; statement is termed. What will be the value of x and y?
(A) x will be 6, y will be 9 (B) x will be 6, y will be 10
(C) x will be 5, y will be 9 (D) x will be 5, y will be 10
(52). …………………… operators are also known as relational operators.
(A) Arithmetic (B) Comparison (C) Logical (D) None of these
(53). …………………… operators are also called Boolean operators.
(A) Comparison (B) Logical (C) Arithmetic (D) Relational
(54). The conditional operator in java uses …………………… operands.
(A) two (B) three (C) four (D) None of these
(55). The conditional operator in java is also termed as …………………… operator.
(A) Unary (B) Binary (C) Ternary (D) None of these
(56). …………………… refers to conversion of the data type manually that wouldn’t done automatically in java.
(A) Type conversion (B) Type casting (C) Promotion (D) Increment
(57). When two operators are having different priority, then with the …………………… precedence is operated
first.
(A) lower (B) higher (C) equality (D) None of these
(58). There are …………………… types of control structures in Java.
(A) two (B) three (C) four (D) five
(59). A …………………… statement is a group of statements enclosed between a pair of braces, “{“ and “}”.
(A) Control Structure (B) Block (C) Method (D) None of these
(60). The …………………… statement when used in a program enables to take one of two alternatives courses of
action depending on whether the value of a given Boolean values expression is true or false.
(A) switch (B) if (C) for (D) None of these
(61). …………………… statement is used when there are many alternative actions to be taken depending upon the
value of a variable or expression.
(A) if (B) switch (C) for (D) None of these
(62). The …………………… statement is used to transfer the control outside switch or loop structure.
(A) end (B) break (C) continue (D) None of these
(63). When a loop is used inside a loop is termed as …………………… loop.
(A) structured (B) labeled (C) Nested (D) Multiple
(64). How many basic data types are supported in Java?
(A) 2 (B) 4 (C) 8 (D) 16

Mahesh Sir - 9724665284 PAGE NO: 68 App : Clear Code Technical Technical
(65). Which character set is used for char data type in Java?
(A) Unicode (B) ASCII (C) EBCIDIC (D) All of these
(66). Which of the following is not allowed as first character in valid variable name?
(A) Underscore(_) (B) Digit (C) Letter (D) Dollar ($)
(67). What is the default value of Boolean type data?
(A) null (B) true (C) false (D) 0
(68). What will be the result of arithmetic expression %-7/2?
(A) -3 (B) -1 (C) -3.5 (D) 1
(69). What is Java?
(A)A Scripting language (B) Object oriented Programming language
(C) File oriented language (D) Structured programming language
(70). Java was developed in the year........
(A) 1990 (B) 1992 (C)1991 (D)1993
(71). Java is small, simple and portable across platforms and operating systems, at the............level.
(A)source program (B)Binary (C)hexa numbers (D)(A) and (B) both
(72). Which sentence is true about java language?
(A)It is an object oriented language (B) It was developed in 1991 by Sun Microsystems
(C)It can work at source level and binary level (D) All of these
(73). Java is portable to a wide range of........
(A)small devices (B)efficient devices (C)hardware devices (D)big devices
(74). Which type of program codes can be written using Java?
(A)Object oriented (B) Flexible modular (C) Reusable (D) All of these
(75). What is basic class?
(A)A part of Java Development Kit (JDK) (B) Information Class
(C) (A) and (B) of both (D) No class is there
(76). All classes of java library are written in .......
(A)Java (B) Linux (C) Unix (D) C Language
(77). What is the meaning of platform independent ?
(A)Anything can be done in java
(B) It can be moved from one computer system to the other.
(C) (A) and (B) both
(D) Doing anything at platform level
(78). At.............level, platform-independence is possible due to bytecode interpreter.
(A)Source Program (B)Binary Level (C)Hexa level (D)None of these
(79). The machine language of JVM is.........
(A)Java Byte Code (B)Java Machine Code
(C)Java Binary Code (D)Java Hexa Code
(80). What is the disadvantage of using bytecode?
(A)It is machine language (B)It is slow in processing
(C)It is costly (D)All of these
(81). .......code is faster to execute.
(A)Machine (B)Native (C)Panic (D)Gative
(82). Minimum how many classes are required in java program?
(A)2 (B)3 (C)4 (D)1
(83). What is not available in java?
(A)main (B)typedef (C)Bite code (D)All of these
(84). ........work as a java compiler.
(A)jrd (B)javac (C)SciTE (D)java
(85). ........file is also called byte code file.
(A)Callcost.java (B)Callcost.class (C)Callcost.javac (D) Callcost.byte
(86). Byte code file has..........extension.
(A).java (B).jdk (C).class (D)javac
(87). ........compliler is used to execute the file which is compiled by the computer........
(A)Java (B)SciTE (C)javac (D)run

Mahesh Sir - 9724665284 PAGE NO: 69 App : Clear Code Technical Technical
(88). What is the general name of bytecode file?
(A)Any name can be given (B) class name having main
(C)The names of Java source file (D)(B) and (C) both
(89). The body of java program is included in.........
(A)main() (B)display() (C)body() (D)void()
(90). ........part of java program is neither compiled nor interpreted.
(A)Body (B) Function (C) Comment (D) Procedure
(91). . What is the name of method which is used to display information in java program
(A)System.out.print (B) System.out.println (C)(A) and (B) both (D)System.out.print
(92). ..........method can only display information to the user.
(A)System.out.print (B)System.out.println
(C)System.print.out (D)System.out.displayline
(93). When java program is sent to interpreter, it goes to......method first.
(A) main() (B)body() (C)display() (D)none of these
(94). Most of the java .................. is/are very similar to C Language.
(A) Coding (B) Logic (C) Syntax (D) Operators
(95). Java is an object oriented programming language developed by..................
(A) Sun Macromedia (B) Sun Microsystems (C) Sun Multimedia (D) Sun systems
(96). Java Language was developed in the year..................
(A) 1990 (B) 1991 (C) 1992 (D) 1993
(97). Java is .................. language.
(A) a Procedural Structure (B) an Object Oriented Programming
(C) a Hierarchy Structure (D) All of these
(98). The basic class libraries of java are the part of ..................
(A) jre (B) jsp (C) jdk (D) jps
(99). At binary level, java platform independence is possible due to .................. interpreter.
(A) Developer (B) Bytecode (C) Java Interpreter (D) Compiler
(100). The advantage of Bytecode of Java is..................
(A) It is not specific to any processor (B) It is not specific to any operating system
(C) Both (A) & (B) (D) None of these
(101). A java program is composed of ..................
(A) methods (B) classes (C) objects (D) variables
(102). .................. is not available in java, which is available in C programming.
(A) derivedtype (B) typedef (C) user defined type (D) All of these
(103). The extension of java programming language file is ..................
(A) .jar (B) .java (C) .jsp (D) .jp
(104). Using JDK, the Java interpreter (.class file) is simply called using .................. command.
(A) java (B) javac (C) compile (D) javax
(105). If we don’t write any access specifier/ before the class name in java, it is considered to be ................. by
default.
(A) public (B) private (C) protected (D) None of these
(106). The extension of the bytecode file of java is ..................
(A) .bcd (B) .java (C) .class (D) .bcod
(107). The .class extension is refers to ..................
(A) Java Compiler (B) Java Source File (C) Java Bytecode File (D) Java Interpreter
(108). The java command is refers to ..................
(A) Java Compiler (B) Java Source File (C) Java Bytecode File (D) Java Interpreter
(109). The .......... command(s) takes the values to be displayed as an argument and prints the result on the screen.
(A) System.out.print (B) System.out.println (C) Both (A) & (B) (D) None of these
(110). The word ‘public’ before any method in program means ..................
(A) function can be called inside the program (B) function can be called outside the program
(C) Both (A) & (B) (D) None of these
(111). Using SciTE, java programming can be compiled from .................. menu.
(A) Run (B) Edit (C) Tools (D) Compile

Mahesh Sir - 9724665284 PAGE NO: 70 App : Clear Code Technical Technical
(112). Java program can be compiled from .................. menu using SciTE.
(A) Tools-->Compile (B) Compile-->Compile
(C) File-->Compile (D) Run-->Compile
(113). The rules of the programming languages are determined that what is allowed; and these rules are called
.................. of the language.
(A) Rules (B) Syntax (C) Grammar (D) Design
(114). Which of the following statement is correct in context to methods in java?
(A) A method in java can be written anywhere in the program.
(B) A method can always be private in the program.
(C) A method can’t exist by itself; it has to be part of a class.
(D) A method can’t be overloaded.
(115). .................. determines the required memory size, range of values that can be performed in java program.
(A) Variables (B) Literals (C) Data Types (D) Comments
(116). Java supports the .................. primitive data types.
(A) seven (B) eight (C) nine (D) ten
(117). Which of the following data types is not an integer type?
(A) Byte (B) int (C) long (D) None of these
(118). There are .................. number of data types in java that can hold the real numbers.
(A) two (B) three (C) four (D) five
(119). ‘char ‘ data types holds a single character from the.................. character set.
(A) ASCII Code (B) Unicode (C) Both (A) & (B) (D) None of these
(120). The built in data types of java are also called .................. data types.
(A) class defined (B) pre-defined (C) primitive (D) user defined
(121). Choose the correct option for “Match the following”; data types with their respective sizes.
(A) byte : i) 4 Bytes (B) short : ii) 2 Bytes (C) float : iii) 8 Bytes (D) double : iv) 1 Byte
(A) A-iv, B-ii, C-I, D-iii (B) A-iii, B-iv, C-I, D-ii
(C) A-ii, B-iv, C-I, D-iii (D) None of these
(122). The ‘char’ data type has the .................. range of values
(A) 4 bits Unicode character (B) 8 bits Unicode character
(C) 16 bits Unicode character (D) None of these
(123). A name use to refer the data stored in computer memory is called a ..................
(A) Literal (B) Data Type (C) Variable (D) Comment
(124). The syntax for the declaration the variable in java is ..................
(A) <type-name> {variable-names};
(B) <variable-names> {type-name};
(C) Both (A) & (B) (D) None of these
(125). Which of the following is the reserved word of java?
(A) public (B) static (C) void (D) All of these
(126). Which of the following is the invalid variable name in Java?
(A) birth date (B) dob (C) Both (A) & (B) (D) None of these
(127). In java, there are .................. kinds of variables.
(A) two (B) three (C) four (D) five
(128). The .................. variables are not initialized with values in Java.
(A) Instance (B) Local (C) Class (D) None of these
(129). Numeric literals are used to represent .................. or ................. numbers.
(A) integer, short (B) float, double (C) integer, real (D) None of these
(130). Which of the following literals are allowed by Java?.
(A) decimal (base 10) (B) binary (base 2)
(C) Both (A) & (B) (D) None of these
(131). In Java, a numeric literal with a leading 0 (zero) is interpreted as an ................. number.
(A) Binary (B) Octal
(C) Hexadecimal (D) Decimal
(132). Which of the following literals is an integer literal?
(A) 054 (B) 54 (C) 0x54 (D) 54.0

Mahesh Sir - 9724665284 PAGE NO: 71 App : Clear Code Technical Technical
(133). Which of the following literals is an octal number literal?
(A) 054 (B) 54 (C) 0x54 (D) 54.0
(134). Which of the following scientific notation number is correct in Java?
(A) 1.3E12 (B) 13E.12 (C) .13.E12 (D) None of these
(135). For the type boolean, there is/are precisely .................. literal(s) can be used.
(A) one (B) two (C) three (D) four
(136). .................. literals are expressed by a group of character surrounded by a double quotes.
(A) Character (B) String (C) Both (A) & (B) (D) None of these
(137). Choose the correct option for “Match the following”; Data types with their Literals.
(A) int : i) 078 (B) double : ii) 78 (C) float : iii) 78.0 (D) Octal : iv) 78f
(A) A-iv, B-ii, C-I, D-iii (B) A-iii, B-iv, C-I, D-ii
(C) A-ii, B-iii, C-iv, D-i (D) None of these
(138). The Unicode sequence \u2122 will produces a .................. symbol.
(A) Trade Mark (TM) (B) Copyright ©
(C) Registered ® (D) None of these
(139). In Java, .................. comment begins with /* and ends with */.
(A) Single Line (B) Multi Line (C) Documentation (D) All of these
(140). The basic building block of .................. are literals, variables and function calls.
(A) conditions (B) expressions (C) comments (D) operators
(141). …………………… are special symbols used to build an expression in Java.
(A) Literals (B) Constants (C) Variables (D) Operators
(142). Which of the following operator can be used as unary operator also in Java?
(A) + (B) * (C) / (D) %
(143). When lower range data type is implicitly converted to higher data type to have the same type of operands.
This type of conversion is also known as ……………………
(A) type conversion (B) type casting (C) promotion (D) increment
(144). The ++ operator is used before variable; e.g. ++a; is also termed as ……………………
(A) Post increment (B) Pre increment (C) Real Increment (D) None of these
(145). If the value of x = 5 and y= 4 + ++x; statement is termed. What will be the value of x and y?
(A) x will be 6, y will be 9 (B) x will be 6, y will be 10
(C) x will be 5, y will be 9 (D) x will be 5, y will be 10
(146). When x++; or ++x; is used in a program, it is termed as …………………… statement in java.
(A) standalone (B) individual (C) single (D) binary
(147). Choose the correct option for “Match the following”; Comparison operators.
(A) A == B : i) Is A “greater than or equal to” B? (B) A >= B : ii) Is A “less than” B?
(C) A < B : iii) Is A “Not equals to” B? (D) A != B : iv) Is A “equals to” B?
(A) A-iv, B-i, C-ii, D-iii (B) A-iii, B-iv, C-I, D-ii
(C) A-ii, B-iii, C-iv, D-i (D) None of these
(148). Choose the correct option for “Match the following”; Logical operators.
(A) AND : i) || (B) OR : ii) ^ (C) NOT : iii) && (D) XOR : iv) !
(A) A-iii, B-ii, C-iv, D-i (B) A-iii, B-i, C-iv, D-ii
(C) A-ii, B-iii, C-iv, D-i (D) None of these
(149). Choose the correct option for “Match the following”; Operators.
(A) && : i) Assignment Operator (B) = : ii) Increment Operator
(C) ++ : iii) Arithmetic Operator (D) % : iv) Logical Operator
(A) A-iv, B-i, C-ii, D-iii (B) A-iii, B-iv, C-I, D-ii
(C) A-ii, B-iii, C-iv, D-i (D) None of these
(150). “<variable><operator>=<expression>” (e.g. a+=(B)is a syntax of …………………… operator.
(A) Assignment (B) Shorthand (C) Conditional (D) None of these
(151). The syntax of the type casting is: ……………………
(A) (<data type>) <expression> (B) <variable name> <expression>
(C) (<data type>) <variable name> (D) None of these
(152). ) Precedence rule can be explicitly overridden by explicit ……………………
(A) operator (B) parenthesis (C) statement (D) None of these.

Mahesh Sir - 9724665284 PAGE NO: 72 App : Clear Code Technical Technical
(153). …………………… are used to repeat a sequence of statements over and over until same condition occurs.
(A) Switch Statements (B) Loops
(C) If Statements (D) None of these
(154). A variable declare insider a block, they are termed as …………………… variables.
(A) Local (B) Class (C) Instance (D) Global
(155). When if statement is executed, it first evaluates …………………… expression.
(A) integer (B) boolean (C) character (D) None of these
(156). The switch statement, the test expression should be the …………………… data type only.
(A) int (B) char (C) byte (D) All of these
(157). The …………………… statement is used to skip the following statements in a loop and continue with the
next iteration.
(A) end (B) break (C) continue (D) None of these
(158). The label can be added in java program using …………………… symbol.
(A) ; (semi colon) (B) . (period) (C) : (colon) (D) None of these
(159). What is the default data type of floating point literal?
(A) int (B) long (C) float (D) double
(160). Which of the following is compiled error free?
(A) for(;;0 {int i=7}; (B) while(1){int i=7};
(C) while(True) {int i=7}; (D) All of these
(161). Which of the following is not a basic data type in Java?
(A) char (B) long (C) byte (D) String
(162). What will be the result of arithmetic expression of 7/2?
(A) 3 (B) 3.5 (C) 1 (D) 0
(163). What will be the result of arithmetic expression -7.5%2?
(A) -3 (B) -3.5 (C) 1.5 (D) Error
(164). Java language is developed for.........workstation.
(A)UNIX (B) Linux (C) Windows (D) Mac
(165). . ..........Company developed java.
(A)Intel (B) Oracle
(C)Sun Microsystems (D)Microsoft
(166). Java language is developed after ......... language.
(A)C (B)C ++ (C)COBOL (D)FORTRAN
(167). . ............is very similar to C language.
(A)C++ (B) FORTRAN (C) COBOL (D) Java
(168). Which sentence is false for java?
(A)it is ideal for distributing executable programs
(B)It can easily be used on different platforms
(C)It is considered as scripting language
(D)It is considered General Purpose Programming Language
(169). Java Class Library provides feature of .......utilities functions.
(A)basic data types (B)system input (C)Reusable (D)all of these
(170). What types of classes are there in JDK?
(A)For networking (B) For internet Protocol
(C) For user interface toolkit (D)All of these
(171). At what Java is platform independent?
(A)Source program and hexadigits
(B)Source program and binary level
(C)At binary and decimal
(D)Source program and decimal digital
(172). At.........level, Java’s primitive data types have consistent sizes across all development platforms.
(A)Source Program (B)Binary Level (C)Hexa level (D)None of these
(173). Designers of java choose to use........
(A) Compilation (B) interpretation
(C) Combination of compilation and interpretation (D) (A) or (B)

Mahesh Sir - 9724665284 PAGE NO: 73 App : Clear Code Technical Technical
(174). Which sentence is false related for JVM?
(A)Programs written in java are compiled into machine language for a computer that doesn’t really exits.
(B)Java Bytecode interpreter are same for each type of computer
(C)Java Binary files are actually in bytecode form.
(D)Java byte code are not fixed for a processor or any operating system
(175). Using tool in java Byte code is converted to.........
(A)Gative code (B)Panic code
(C)Native code (D)Machine code
(176). .........program is made of many classes.
(A)C (B) C ++
(C)Java program (D)FORTRAN
(177). Which method must be there in java program?
(A)main (B)public
(C)type (D)All of these
(178). Java source file is saved with ........ extension.
(A).doc (B).jav (C).Java (D).class
(179). After errorless compilation of java program, ...........file is automatically created.
(A).class (B).java (C).cmp (D).jacm
(180). . Byte code file is also known as..............
(A) Source file (B) file with extension .java
(C)File compiled with compiler (D) executable file
(181). .........compliler makes the byte code file in Java language.
(A)jdk (B)javac
(C)ecj (D)none of these
(182). Java interpreter executes the file having extension only.......
(A).java (B).class
(C).jav (D).jdk
(183). .......routine is executed first when program is executed in Java application.
(A)main() (B)void()
(C)(A) and (B) both (D)none of these
(184). Comment in java program is written with.......sign.
(A)// (B)between /* and */
(C)(A) ad (B) both (D)Between // and //
(185). ............subroutine statements are used to display information of java program to the user.
(A) Function (B) Method
(C)(A) or (B) both (D) none of these
(186). .........method can display information and leave a single line.
(A)System.out.print (B)System.out.println
(C)System.print.out (D)System.out.displayline
(187). The textual data is given in..........symbol in System.out.print.
(A)(‘ ‘)Single quote (B)(“ “)Double quote
(C)(# #)(Hash Sign) (D)None of these
(188). Java is an object oriented programming language developed by..................
(A) Sun Macromedia (B) Sun Microsystems
(C) Sun Multimedia (D) Sun systems
(189). .................. Language is considered to be the ideal language for distributing the executable programs via the
World Wide Web.
(A) C (B) VB.Net
(C) Java (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 74 App : Clear Code Technical Technical
Classes and Objects In Java
Total Marks: 10
(1). Which of the following keyword is used to declare Class variable and class methods?
(A)static (B) private (C) public (D) package
(2). Which of the following method can be called without creating an instance of a class?
(A) Instance method (B) Class method (C) Constructor method (D) All of the above
(3). Which method is invoked automatically with common of an object?
(A)Instance method (B) Constructor (C) Class method (D) All of the above
(4). Which of the following is used to invoke an instance method in Java?
(A)The name of the object, colon(;) and the name of the method.
(B) The name of the object, dot(.) and the name of the method.
(C) The name of the class, colon(;) and the name of the method.
(D) The name of the class, dot(.) and the name of the method.
(5). When methods in the super class and sub class have same name and signature, what are they called?
(A)Overloaded methods (B) Overridden methods
(C) Inherited methods (D) All of the above
(6). A ……………… can also be considered as a design for the real life objects.
(A)object (B) class (C) function (D) constructor
(7). Every class in Java is generally made up of …………………… components.
(A)two (B) three (C) four (D) five
(8). …………………… are used to access or modify attributes of a class.
(A)Attributes (B) Methods (C) Objects (D) All of the above
(9). Keyword new is used to create the object by allocating memory is termed as ……………………
(A)Declaration (B) Instantiation (C) Initialization (D) Construction
(10). The syntax of the class object declaration is :
(A)<class name><method><objectname>; (B)<classname><objectname>;
(C) <method><class name><object name>; (D) None of these
(11). The objects live in the special portion of the memory called the ……………………
(A)mass (B) heap (C) stack (D) mound
(12). Which of the following is correct object created as per Java?
(A)String str=new String(“I Love India”); (B) Room r=new Room( )
(C) Both (A) & (B) (D) None of these
(13). Class is an …………………… representation of an object.
(A)abstract (B) intangible (C) elusive (D) obscure
(14). Instance variables and instance methods are accessed via ……………………
(A) attributes (B) methods (C) operators (D) objects
(15). When the …………………… variables are referred within the methods of the same class, there is not need
to use dot(.) operator.
(A) Instance (B) class (C) constructor (D) All of the above
(16). Instance variables and instance methods are access via ……………………
(A) classes (B) variables (C) abstract (D) objects
(17). Which of the following statement(s) is/ are incorrect?
(A) Every object is created using new keyword. .
(B) Every object has its own instance variables occupying different spaces in memory. .
(C) Values of instance variables are stored in class itself.
(D) The class variable should be allocated the memory only once per class.
(18). Which of the following statement(s) is/ are incorrect?
(A) Class variables and class methods can be accessed using a class name or reference variable.
(B) Instance variables and instance methods can‟t be accessed from class methods.
(C) Class methods do not belong to any object. (D) Instance variables do not belong to any object.
Mahesh Sir - 9724665284 PAGE NO: 75 App : Clear Code Technical Technical
(19). The …………………… variables are defined within a class but outside any method.
(A) static (B) instance (C) global (D) local
(20). Which of the following statement(s) is/ are incorrect?
(A) Instance variables are allocated memory from heap area.
(B) Instance variables are initialized by default values.
(C) Class variables shares the memory with all its objects.
(D) Instance variables are allocated memory only once per class & shared by all its objects.
(21). Java provides the different forms of methods with same name, which is termed as ……………
(A) Data Hiding (B) Data Abstraction (C) Encapsulation (D) Polymorphism
(22). Java facilitates to create methods with same name but different parameters, this facility is termed as ……
(A) method unloading (B) method overloading
(C) method reloading (D) method loading
(23). Which of the following statement(s) is/are correct in context of Constructors in Java?
(A) Constructors must have the same name as of the object names.
(B) Constructors do not have any return type.
(C) Constructors are invoked explicitly anywhere in the program.
(D) Constructors are local methods.
(24). Which of the following statement(s) is/are correct in context of Constructors in Java?
(A) Constructors can be overloaded.
(B) Constructors return the class type.
(C) Constructors are invoked explicitly anywhere in the program.
(D) Constructors are global methods.
(25). If the name of class is Room in java, which of the following is the constructor with arguments?
(A) Room( ) (B) Room(float l, float w)
(C) static void Room( ) (D) double Room(float l, float w)
(26). …………………… modifiers are also known as visibility modifiers.
(A) Access (B) Control (C) Display (D) Program
(27). There are …………………… levels of visibility to provide necessary protection.
(A) two (B) three (C) four (D) five
(28). Which of the following statement is incorrect?
(A) The Four P‟s of protection are public, package, protected and private.
(B) public, protected and private are used before the type of variable or method.
(C) When a file does not have package statement, the class defined in the file are placed
in default package.
(D) protected visibility is the default mode.
(29). The …………………… variables and methods are visible anywhere and thus can be accessed from other
source files and packages also.
(A) public (B) protected (C) private (D) package
(30). The source file without package statement is considered as a package by ……………………
(A) loaded (B) default (C) overloaded (D) user defined
(31). Highest level of protection can be achieved by using the …………………… protection level.
(A) public (B) protected (C) private (D) package
(32). The variables and methods of class cannot be seen in other class, when the visibility protection level is used as
……………………
(A) public (B) protected (C) private (D) package
(33). The best way to provide data encapsulation is to make as much data as …………………… as possible.
(A) public (B) protected (C) private (D) package
(34). When the user restricts access to date by declaring them as private, the purpose is to proect them from getting
directly accessed or modified by methods of other class. If user want to allow such data to be used by others,
then the user should write …………………… methods.
(A) restricted (B) mutator (C) accessor (D) processor
(35). The accessor methods are also termed as ……………………
(A) getter (B) setter (C) putter (D) provider

Mahesh Sir - 9724665284 PAGE NO: 76 App : Clear Code Technical Technical
(36). If the user wants to allow other methods to read only the data value, the user should use ……………………
methods.
(A) getter (B) setter (C) putter (D) provider
(37). The use of …………………… method(s) will prevent the variables from getting directly accessed and
modified by other class.
(A) accessor (B) mutator (C) Both (A) & (B) (D) None of these
(38). Which of the following defines attributes and methods?
(A) Class (B) Object (C) Function (D) Variable
(39). Which of the following operator creates an object and returns its reference?
(A)assign (B) static (C) new (D) create
(40). Which of the following refers more than one method having same name but different parameters?
(A)Overloaded methods (B) Overridden methods
(C) Duplicate methods (D) All of the above
(41). Which of the following is the keyword used to refer a super class constructor in subclass constructor?
(A)extends (B) super (C) new (D) public
(42). Which of the following is accessible by instance methods?
(A)Only instance variables (B) Only class variables
(C) Both Instance variables and class variables (D) All of the above
(43). A ……………… contains data and program code.
(A)object (B) class (C) function (D) constructor
(44). The ……………… shares the common characteristics of a class.
(A)object (B) property (C) function (D) variable
(45). …………………… are defined by variables in a class.
(A) Attributes (B) Methods (C) Objects (D) All of the above
(46). A variable name of type class is declared with syntax <class name><variable name> is termed as
……………………
(A)Declaration (B) Instantiation (C) Initialization (D) Construction
(47). Constructor is called to initialize the newly created object is termed as ……………………
(A)Declaration (B) Instantiation (C) Initialization (D) Construction
(48). Reference is the …………………… of the memory location where the object is stored.
(A)pointer (B) address (C) operator (D) citation
(49). When an object is created to allocating memory, a special method ………………… is executed.
(A)creator (B) inventor (C) constructor (D) designer
(50). In object-oriented programming (OOP) languages, creating an object is called ……………………
(A)Declaration (B) Instantiation (C) Initialization (D) Construction
(51). All instances of class are allocated memory in data structure called ……………………
(A) mass (B) heap (C) stack (D) mound
(52). The syntax for accessing methods or variables of a class is:
(A) <class name>.<instance variable or method>
(B) <object reference>.<instance variable or method>..
(C) <class reference>.<object reference>
(D) None of these
(53). The new keyword returns a ……………… to an object that represents an instance of the class.
(A) instance (B) reference (C) address (D) variable
(54). Instance variables and instance methods can be accessed using …………………… operator.
(A) dot(.) (B) dollar($) (C) modulus (%) (D) comma (,)
(55). The …………………… variables can be accessed without creating an instance of a class.
(A) static (B) instance (C) global (D) local
(56). Variables defined inside methods or blocks are called …………………… variables.
(A) static (B) instance (C) class (D) local
(57). The …………………… variables are defined within a class, outside any method, with the static keyword.
(A) local (B) instance (C) global (D) class
(58). The word polymorphism means ……………………
(A) many things (B) single thing (C) many forms (D) single form
Mahesh Sir - 9724665284 PAGE NO: 77 App : Clear Code Technical Technical
(59). When a single method is having different signatures (syntaxes) it is termed as ……………………
(A) method unloading (B) method overloading
(C) method reloading (D) method loading
(60). …………………… is a special kind of method that is invoked when a new object is created.
(A) Local (B) Constructor (C) Destructor (D) Global
(61). Which of the following statement(s) is/are correct in context of Constructors in Java?
(A) Constructors must have the same name as class name.
(B) Constructors return the class type.
(C) Constructors cannot be overloaded.
(D) Constructors are global methods.
(62). If the name of class is Room in java, which of the following is the default constructor?
(A) Room( ) (B) Room(float l, float w)
(C) static void Room( ) (D) double Room(float l, float w)
(63). Match the table of Access Modifier with its visibility. Access Modifier Visibility 1) public : i)  
2) package : ii) widest 3) protected : iii) narrowest 4) private : iv)   
(A) 1-ii, 2-iv, 3-i, 4-iii (B) 1-ii, 2-iv, 3-i, 4-iii
(C) 1-iii, 2-iv, 3-ii, 4-i (D) 1-iv, 2-iii, 3-ii, 4-i
(64). …………………… modifiers are about controlling visibility in Java.
(A) Access (B) Control (C) Display (D) Program
(65). …………………… is used to organize classes.
(A) Public (B) Protected (C) Private (D) Package
(66). If the user wants to make visible the methods or variables of class to outside that class, those variables and
methods have to be …………………… visibility mode.
(A) public (B) protected (C) private (D) package
(67). The default of visibility protection is …………………… access modifier.
(A) public (B) protected (C) private (D) package
(68). The level of protection of …………………… is used to allow the access only to subclasses or to share with
the methods declared as “friend”.
(A) public (B) protected (C) private (D) package
(69). The …………………… methods and variables are directly accessible only by the methods defined within a
class.
(A) public (B) protected (C) private (D) package
(70). The …………………… protection level provides data encapsulation, data hiding, limiting its manipulation.
(A) public (B) protected (C) private (D) package
(71). To access the private variables from another class :
(A) It can be directly accessed from other class.
(B) It can be made available indirectly by the accessible methods.
(C) It can be made available directly by the private methods.
(D) It is not possible to access the private members from another class.
(72). If the user wants to allow the restricted data to be modified by others, then user should write the
…………………… methods.
(A) restricted (B) mutator (C) accessor (D) processor
(73). The mutator methods are also termed as ……………………
(A) getter (B) setter (C) putter (D) provider
(74). If the user wants to allow other methods to modify the data value, the user should use ……………………
methods.
(A) getter (B) setter (C) putter (D) provider
(75). …………………… models „is-a‟ relationship between two classes.
(A)Aggregation (B) Composition (C) Inheritance (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 78 App : Clear Code Technical Technical
Working With Array and String
Total Marks: 10
(1). ………….. are useful to represent vector, matrix and other multi-dimensional data.
(A) Arrangements (B) Arrays (C) Assortments (D) Groups
(2). …………. Is used to represent two dimensional (2-D) data structure like table or rows andcolumns.
(A) Vector (B) Path (C) Matrix (D) Route
(3). All the…………. of an array are stored in memory using contiguous storage space.
(A) indexs (B) values (C) features (D) elements
(4). In Java, …………… is an object used to manage list of items.
(A) array (B) variable (C) matrix (D) element
(5). An array object can be created in……….. ways.
(A) one (B) two (C) three (D) four
(6). Array with……… dimension is known as 1-D array.
(A) double (B) triple (C) both (A) and (B) (D) single
(7). Instead of declaring individual variables like marks 1, marks2, marks3, marks4, marks5; one
can declare array……….. .
(A) Marks[5] (B) Mark[5] (C) Marks[1-5] (D) All of these
(8). To declare a ……….. Array a pair of square brackets [ ] is used after array name or after datatype.
(A) 2-D (B) 1-D (C) 3-D (D) 4-D
(9). For example, to store the marks obtained by a student in five tests in mathematics subject, an
array of ………. Integer elements can be used,
(A) five (B) six (C) four (D) seven
(10). The array „marks‟ refers to…….. location where five integer values are stored.
(A) chip (B) memory (C) variable (D) address
(11). Thus array „marks‟ requires …….. bytes in contiguous locations in memory.
(A) 5 x 4 =20 (B) 5 x 5 =25 (C) 5 x 3 =15 (D) 5 x 2 = 10
(12). ………… specifies the position of an element in an array.
(A) Number (B) Index (C) Variable name (D) Element
(13). The array variable marks [5] has an index value from……… .
(A) 1 to 5 (B) 0 to 4 (C) 0 to 5 (D) 1 to 4
(14). In array variable marks [5], marks [4] refers to the……….. element.
(A) last (B) second (C) first (D) fourth
(15). Array being an object in java, array name is also a……… variable.
(A) position (B) location (C) address (D) reference
(16). As array is an object, so its elements are initialized with………. Values.
(A) default (B) initial (C) declared (D) index
(17). Which of the following is correct initialization of 1-D array?
(A) int marks [ ] = { 90, 70, 77}; (B) int [ ] marks = { 90,70,77};
(C) int marks [ ] = { 90, 70; 77} (D) both (A) and (B)
(18). The array size is same as the number of values specific in………..
(A) braces (B) index
(C) default value (D) initialization
(19). Every element of an array is an individual variable that can be referred by using.
(A) index (B) value (C) tabular (D) element
(20). Instead of writing the code, various static methods provided by java using……… class can be used.
(A) java. Arrays (B) java.utility (C) java.util.Arrays (D) All of these
(21). To sort an entire or part of array, ……..method can be used.
(A) sort( ) (B) file( ) (C) display ( ) (D) order ( )
(22). To search an element in an array, arrays class provides………… method.
(A) search ( ) (B) find ()
(C) binary search ( ) (D) bin search ( )
Mahesh Sir - 9724665284 PAGE NO: 79 App : Clear Code Technical Technical
(23). ……………. Arrays are used to store tabular data in the form of rows and columns.
(A) 2-D (B) 1-D (C) 3-D (D) 4-D
(24). Int marks [ ] [ ] = new int[ 5 ] [ 3 ] , the logical view of array elements is a table of ………
(A) 3 rows and 5 columns (B) 15 columns
(C) 5 row and 3 columns (D) 15 rows
(25). To create …………. Array, and array of an array has be created.
(A) 2-D (B) 1-D (C) 3-d (D) 4-D
(26). In 2-D array, each row is considered as….. array element.
(A) 2-D (B) 1-D (C) 3-D (D) 4-D
(27). In java, 2-D array is considered as an……… of 1-D array.
(A) matrix (B) array (C) dimension (D) group
(28). Size of each row of an array can be known using……… property of 1-D array.
(A) length (B) height (C) len (D) size
(29). for 1-D array, ………. Property returns number of columns in specified row elements.
(A) Length (B) height (C) len (D) size
(30). ………… elements can be accessed using index for each dimension in [ ].
(A) Matrix (B) Array (C) Dimension (D) Group
(31). Declaring an………… without initialization does not create an array object.
(A) matrix (B) array (C) dimension (D) group
(32). 1-D array of……….. can be considered as a string.
(A) spaces (B) groups (C) characters (D) columns
(33). To use variables that can store strings, java supports………. Types of strings.
(A) one (B)two (C) three (D)four
(34). String ( ) without arguments create a………. object with no character.
(A) string (B) character (C) buffer (D) code
(35). String (char ary [ ], int start, intlen) creates a String object using 1-D ary argument starting at ary [start] with
…….. number of characters/
(A) length (B) length (C) len (D) limited
(36). String (string literal ) creates a string…………… which is same as object specified in argument.
(A) literal (B) obj (C) object (D) variable
(37). In java, characters are stored using……….. bytes.
(A) four (B) three (C) two (D) five
(38). A………… can be used with array of bytes as an argument.
(A) method (B) destructor (C) variable (D) constructor
(39). Separate memory is allocated when string objects are created using…….. operator even if strings are identical.
(A) New (B) new (C) int (D) float
(40). The String class provides……….. to compare strings, find length of string, combining strings, obtaining
substrings, converting strings, splitting strings, searching for character or patterns in string etc.
(A) constructors (B) methods. (C) strings (D) classes
(41). Method booleanequalsIgnore Case (Strinsstr) returns ……….. if invoking string is same as str after
ignoring case (case insentive) .
(A) True (B) False (C) Can‟tsay (D) None of these
(42). Method intcompareToTolgnore Case (String str) is same as…………but Case Sensitive.
(A) Equals (B) Ignore Case
(C) equalsIgnore Case (D) compareTo
(43). A String class provided methods for ………..task.
(A) getting number of characters. (B) appending string
(C) copy string or part of string (D) all of these
(44). Method int………. returns number of characters in invoking string.
(A) indexAt (int index) (B) length ( )
(C) getBytes( ) (D) toUpperCAse( )
(45). Method char……….. returns character at index position from the invoking string, index considered from 0.
(A) IndexAt (int index) (B) length( )
(C) getBytes( ) (D) toUpperCase( )

Mahesh Sir - 9724665284 PAGE NO: 80 App : Clear Code Technical Technical
(46). Method string…………. Returns a string after appending str with the invoking string.
(A) toUpperCase() (B) to Lower Case (C) concat (String str)
(D) get Charts (intfromIndex, inttoIndex, char target[], inttargetIndex).
(47). String………. Returns a string with all characters of invoking string converted to uppercase.
(A) toUpperCase() (B) to Lower Case (C) concat (String str)
(D) get Charts (intfromIndex, inttoIndex, char target[], inttargetIndex).
(48). with String object length is a………. .
(A) attribute (B) method (C) string (D) none of these
(49). Java library also provides……….. class in java.util package.
(A) data (B) string (C) time (D) date
(50). Method ………. Constructs data object using current system time.
(A) Data (long elapsed Time) (B) Date ()
(C) toString() (D) getTime( )
(51). Method String ……….. returns a string representing data and time of invoking object.
(A) Data (long elapsed Time) (B) Data ()
(C) toString() (D) getTime( )
(52). Method void set time (long elapsed Time ) sets new date and time of an object using elapsed time.
(A) setTime (long elapsed Time) (B) Date()
(C) toString() (D) getTime()
(53). ………….. class can be used be used to extract calendar information like year, month , date, hour, minute and
second.
(A) data (B) calendar (C) time (D) date
(54). Execution of call „calender.set (Calender.DATE, 20)‟ will set the date to……… .
(A) Today‟s date (B) Yesterday‟s date (C) 20th (D) None of these
(55). Array elements are stored in………
(A)sequential memory locations
(B) scattered memory locations
(C) direct memory locations
(D) random memory locations Identify the incorrect declaration of arrays from the following.
(56). Array are passed to a function argument by……………
(A) value (B) reference
(C) both value and reference (D) none of these
(57). If an array is declared as a a[10], then its elements will be stored as……………..
(A) a[1] to a[10] (B) a[1] to a[9] (C) a[0] to a [9] (D) a[0] to a[10]
(58). If a static array is not initialized, the elements will be set to…….. .
(A) 0 (B) a float number (C)an undetermined value (D) a character constant
(59). If „a‟ is the object of String class and its content is “C IS A LANGUAGE”, then what is the value of
str.length() ?
(A) 14 (B) 15 (C) 12 (D) 11
(60). Method to string() returns ………… data type.
(A) Char (B) String (C) int (D) Boolean
(61). Method concat (String str) returns ………. Data types.
(A) long (B) string (C) void (D) date
(62). An …………. Is a variable representing a collection of homogeneous type of elements.
(A) arrangement (B) array (C) assortment (D) group
(63). ………. Is one dimensional (1-D) data structure that can be used to store list of items likecharacters, numbers.
(A) Vector (B) Path (C) Matrix (D) Route
(64). …………. are useful when same operations are to be performed on various elements of thesimilar type.
(A) Matrixs (B) Arrays
(C) Dimensions (D) Groups
(65). Each element is identified by an………. Position associated with array variable .
(A) index (B) value (C) tabular (D) element
(66). Creating an array is a…….. step process.
(A) one (B) two (C) three (D) four

Mahesh Sir - 9724665284 PAGE NO: 81 App : Clear Code Technical Technical
(67). Which is the way an array object can be created ?
(A) Using new operator and specifying the size. (B) Directly initializing the content of array
(C) Both (A) and (B) (D) None of these
(68). For example,……… can be seen as a collection of one or more scalar variables.
(A) vector (B) path (C) matrix (D) variable
(69). Individual variable elements of an array marks[5] can be accessed as:
(A) marks [1], marks[2], marks[3], marks[4], marks[5]
(B) marks [-1], marks[1], marks[2], marks[3], marks[4]
(C) marks [0], marks[1], marks[2], marks[3], marks[4]
(D) marks [-1], marks[0], marks[1], marks[2], marks[3]
(70). The syntax to declare array is as follows……… .
(A) <data type><array name> [ ]; (B) < data type> [ ] < array name>;
(C) both (A) and (B) (D) none of these
(71). Array object named „marks‟ with size for 5 elements can be created as follows:
(A) int marks [ ] = new int [5]; (B) int [ ] marks = new int [5];
(C) both (A) and (B) (D) none of these
(72). integer of int data type uses ……….. bytes storage space.
(A) 2 (B) 3 (C) 4 (D) 5
(73). To refer an element of an array, an index or subscript is used in…….. after array variable name.
(A) curly bracket { } (B) square bracket [ ] (C) round bracket ( ) (D) none of these
(74). Index value starts from ………… .
(A) 5 (B) 4 (C) 1 (D) 0
(75). In array variable marks [5], marks [0] refers to the ……. Element.
(A) last (B) second (C) first (D) none of these
(76). An object is a……. to variable.
(A) position (B) location (C) address (D) reference
(77). Array name contains……… to memory location where the array elements are stored.
(A) position (B) location (C) address (D) reference
(78). 1-D array is initialized using……. separated values of data elements in braces { }.
(A) semi colon (B) comma (C) colon (D) full stop
(79). When an array is initialized while creating, it does not need the use of………… operator.
(A) New (B) new (C) int (D) float
(80). Class methods are declared as……….. and can be referred without any object in a class.
(A) private (B) void (C) package (D) Static
(81). Like variables, to change the value of an element, an assignment statement can be used which refers a
variables element on……….. side.
(A) right (B) left (C) middle (D) none of these
(82). Methods sort() and fill () are part of……. Class.
(A) java. Arrays (B) java.util
(C) java.util.Arrays (D) all of these
(83). Method ……….. is used to fill or partial array with specified value.
(A) sort( ) (B) fill ( ) (C) display ( ) (D) order ( )
(84). ………… search method does element bye element comparison in a serial manner.
(A) Linear (B) Vertical (C) Horizontal (D) Vector
(85). In java, 2-D array can be declared using array name and 2 pairs of……… to specify the size of two
dimensions row and column respectively.
(A) Curly bracket { } { } (B) Square bracket [ ] [ ]
(C) Round bracket ( ) ( ) (D) None of these
(86). Int marks [ ] [ ] = new int [5] [3], the logical view of array elements is a table of………
(A) 15 (B) 45 (C) 60 (D) 8
(87). Declaration and initialization of 2-D array is very similar to 1-D array except the number of ……..
(A) sizes (B) length (C) index values (D) dimensions
(88). To initialize 2-D array, all these initialized rows are to be enclosed in curly braces { } separating them by…. .
(A) Colon ( : ) (B) Comma (,) (C) Semi colon (;) (D) Full stop (.)

Mahesh Sir - 9724665284 PAGE NO: 82 App : Clear Code Technical Technical
(89). In 2-D array, each name is stored in different row and all names have different number of………
(A) spaces (B) groups
(C) characters (D) columns
(90). For 2-D array, …………… property returns number of rows.
(A) length (B) height (C) len (D) size
(91). …………is a collection of homogeneous type of data.
(A) Matrix (B) Array (C) Dimension (D) Group
(92). Index value starts with……… .
(A) one (B) two (C) zero (D) three
(93). String is nothing but a sequence of…………
(A) spaces (B) groups (C) characters (D) columns
(94). ………….. literals are where a sequence of characters is enclosed between double quotes.
(A) String (B) Character
(C) Numerical (D) None of these
(95). Strings in java are handled by two classes namely „String‟ and……….. .
(A) Strings (B) Characters
(C) Buffer (D) String Buffer
(96). String ( charary[ ]) creates a String object with its initial value using ary……. .
(A) value (B) argument
(C) Index (D) [ ]
(97). String ( StingstrObj) creates a String object which is same as object specified in…….. .
(A) value (B) argument
(C) index (D) square brackets [ ]
(98). String (string literal) creates a String object that refers to the………. specified in argument.
(A) literal (B) obj (C) object (D) variable
(99). To save space, if the characters are…….., an array of bytes should used instead of array of characters.
(A) ASCII (B) coded (C) ACSII (D) ACIIS
(100). When two String objects are created using same string literals, memory space is not allocated for ……..
object.
(A) first (B) second (C)both (A) and (B) (D) none of these
(101). “strl = = str2” …………. The contents of str1 and str2 and not the objects at str1 and str2.
(A) equals (B) matches (C) compares (D) relates
(102). Method booleanequalsIgnore Case (String str) returns ………….. if invoking string is same as str after
ignoring case (case insensitive).
(A) True (B) False (C) Can‟tsay (D) None of these
(103). Method intcompareTo (String str) returns 0, > 0, <0………………if invoking string is equal to, greater than
or less than str respectively.
(A) string (B) negative value (C) integer (D) float
(104). A String class provides methods for………. Task.
(A) extracting part of string.
(B) replacing characters or substrings.
(C) splitting string into substrings
(D) all of these
(105). 87) A string class provides methods for ……… task.
(A) converting string into lowercase or uppercase (B) appending string
(C) copy string or part of string (D) all of these
(106). Method char…………. Returns character at index position from the invoking string, index considered from 0.
(A) indexAt (int index) (B) length( )
(C) getBytes( ) (D) toUpperCase( )
(107). Method void [ ]………… returns an array of characters as bytes from invoking string.
(A) toUppar Case ()
(B) to Lower Case
(C) concat (String str)
(D) get Charts (intfromIndex, inttoIndex, char target[], inttargetIndex).

Mahesh Sir - 9724665284 PAGE NO: 83 App : Clear Code Technical Technical
(108). String………. Returns a string with all characters of invoking string converted to lowercase.
(A) toUpperCase()
(B) to Lower Case
(C) concat (String str)
(D) get Charts (intfromIndex, inttoIndex, char target[], inttargetIndex).
(109). With array variable, length is an……… or property of array;
(A) attribute (B) method (C) string (D) none of these
(110). …………. Class of java does not provide any method to reverse a string.
(A) attribute (B) method (C) string (D) none of these
(111). ……… class encapsulates both data and time and represents the value using milliseconds precision.
(A) Data (B) String (C) Time (D) Date
(112). Method …………. Constructs data object using specified time in milliseconds elapsed since January 1, 1970
GMT.
(A) Date (long elapsed Time) (B) Data ()
(C) toString() (D) getTime( )
(113). Method long………… returns number of milliseconds since January 1, 1970 GMT.
(A) Data (long elapsed Time) (B) Data ()
(C) toString() (D) getTime( )
(114). Like data class, …………. Class is also provided in java.util package.
(A) data (B) calendar (C) time (D) date
(115). Like get methods, set methods are used to set the value of field constants of……… class.
(A) data (B) calendar (C) time (A) date
(116). …………is the starting index of an array.
(A) 0 (B) 1 (C) Null (D) All of these
(117). Array is used to represent the following.
(A) A list of data items of different data types
(B) A list of data items of real data type.
(C) A list of data items of same data type.
(D) A list of data items of integer data type.
(118). An array a[8] will store how many values ?
(A) 8 (B) 7 (C) 9 (D) 0
(119). The index or subscript value for an array of size a ranges from
(A) 1 to n-1 (B) 0 to n-1 (C) 1 to n (D) 0 to n
(120). 118) If a static array is not initialized, the elements will be set to……….
(A) 9 (B) 10 (C) 8 (D) 11
(121). 120) What type of value is returned when we use get method of Calender class with constant MONTH ?
(A) Char (B) String (C) int (D) Boolean
(122). Method getTime() returns ………. Data type.
(A) long (B) string (C) void (D) date
(123). What is the full form of GMT ?
(A)Greenwich Median Time
(B) Greenwich Mode Time
(C) Greenwich Modern Time
(D) Greenwich mean Time

Mahesh Sir - 9724665284 PAGE NO: 84 App : Clear Code Technical Technical
Exception Handling
Total Marks: 6
(1). In few cases a compiled program can…………….. While it its executing.
(A) terminate (B) finish (C) dismiss (D) discharge
(2). An……… is an indication of a problem that occurs during a program’s execution.
(A) exception (B) inaccuracy (C) error (D) e-fault
(3). Although exceptions occur infrequently, one has to be careful in handing such cases while
writing the………. .
(A) program (B) message (C) data (D) code
(4). There are few standard……… available in java, a technique to guarantee that a particular
block of code will always be executed, even if exceptions are present in our program.
(A) data info (B) programs (C) errors (D) exceptions
(5). Error can be broadly classified into……… categories.
(A) four (B) three (C) two (D) five
(6). A …….. is used to convert source code into object code.
(A) compiler (B) interpreter (C) translator (D) decoder
(7). If there is a syntax error in the program, a compilation error is displayed and….. file is not
created.
(A) .source (B) .dat (C) . class (D) .obj
(8). The java……… suggests in an output, the type of error, along with the line number where
the error has occurred.
(A) compiler (B) interpreter (C) translator (D) decoder
(9). In the field of computer Science, “Exit code” or “Exit status” indicates whether the
command or a……. executed successfully or not.
(A) data type (B) program (C) error (D) method
(10). Code………….. indicates that some problem occurred while executing the command.
(A) 1 (B) -1 (C) 0.0 (D) 0
(11). The array “……… citylist [ ] = {“Ahmedabad”, “Baroda”, “Rajkot”, “Surat”};” contains name of
four different cities.
(A) string (B) int (C) long (D) boolean
(12). the …….. contains a hierarchy of classes dealing with various exceptions.
(A) java.lang package (B) java.io package
(C) both (A) and (B) (D) none of these
(13). An attempt to divide any number be 0 uses …….. exception class.
(A) ArrayIndexOutOfBoundsException (B) A rithmeticException
(C) FileNotFoundException (D) All of these
(14). An attempt to use null in a case where an object is required uses…….. exception class.
(A) PrinterIOException (B) NullPointeException
(C) NumberFormatException (D) None of these
(15). An I/O error has occurred while printing uses ………. Exception class.
(A) PrinterIOException (B) NullPointeException
(C) NumberFormatException (D) None of these
(16). An……… is an error condition.
(A) allowance (B) error
(C) exclusion (D) e xception
(17). While performing exception handling, one has to try to ensure that the program does not…
………. abruptly nor does it generate unexpected.
(A) Terminate (B) finish (C) Dismiss (D) Discharge
(18). The keywords……… are used in the presence of exceptions, these keywords represent
block of statements.
(A) try (B) catch (C) finally (D) all of these
Mahesh Sir - 9724665284 PAGE NO: 85 App : Clear Code Technical Technical
(19). A………. contains the code that is intended to handle exceptions of a particular type that
were created in the associated try block.
(A) try block (B) catch block (C) finally block (D) all of these
(20). The…….. Statement contains a block of statement within the braces.
(A) try (B) catch (C) finally (D) none of these
(21). The code between a try block creates a……… exception.
(A) double (B) single (C) one or more than one (D) none of these
(22). ………… contains the code that is to be created to handle an exception.
(A) try block (B) catch block (C) finally block (D) all of these
(23). For a …………try block there can be one or more catch blocks.
(A) single (B) double (C) triple (D) none of these
(24). The catch code to handle exception has to be written between.
(A) codes (B) blocks (C) parentheses (D) parameters
(25). Java supports…….. types of exceptions.
(A) various (B) single (C) multiple (D) some
(26). When above kind of exception occurs, an object of type ………… is created and is thrown.
(A) ArrayIndexOutOfBoundsException (B) ArithmeticException
(C) FileNotFoundException (D) All of these
(27). The catch block contains a…………to object “eobj”which is created and thrown by the try
block.
(A) space (B) cell (C) memory (D) reference
(28). if a particular file has to be uploaded to a remote computer, it may lead to…………distinct
exceptions.
(A) one (B) two (C) three (D) four
(29). if a particular file has to be uploaded to a remote computer, another exception mayo occur if
the computer is not connected to the………………
(A) computer (B) network (C) internet (D) system
(30). The code that generates exception should be written within the………………
(A) try block (B) catch block (C) finally block (D) all of these
(31). The last………… can handle any type of exception.
(A) try block (B) catch block (C) finally block (D) none of these
(32). While writing the program, the order of the specific catch blocks does not matter but the……
………… block has to be placed at the end of all catch blocks.
(A) first (B) second (C) third (D) default
(33). The …………… is generally used to clean up to end of executing a try block.
(A) try block (B) catch block (C) finally block (D) all of these
(34). A………… is always executed, regardless of whether or not exceptions are thrown during
the execution of the associated try block.
(A) try block (B) catch block (C) finally block (D) all of these
(35). Each of block must always be followed by at least…………… that is either a catch block or
a finally block.
(A) one block (B) two block (C) three block (D) none of these
(36). A………… is associated with a particular try block and it must be located immediately
following any catch blocks for the corresponding try block.
(A) finally block (B) catch block (C) try block (D) none of these
(37). If the finally block or catch blocks are not positioned correctly, then the program will not ………………..
(A) compile (B) interpret (C) translate (D) decode
(38). For example, an object of…………………… was created when one tries to perform a divide
by zero operation.
(A) ArrayIndexOutOfBoundException (B) ArithmeticException
(C) FileNotFoundException (D) None of these
(39). The object that one throws, must be of type java.lang. …………………… otherwise a
compile error occurs.
(A) Throwable (B) Throws (C) throw (D) throws

Mahesh Sir - 9724665284 PAGE NO: 86 App : Clear Code Technical Technical
(40). when a …………………… statement is encountered, a search for matching catch block begins.
(A) Throwable (B) Throws (C) throw (D) throws
(41). There are……………………… alternative approaches to handle, when an exception occurs
in method or a constructor.
(A) one (B) two (C) three (D) four
(42). When a…………… or a method that can throw exceptions is written to its caller, it is useful
to document that fact.
(A) constructor (B) variable (C) operator (D) compiler
(43). A…………………… can throw multiple exceptions.
(A) method (B) variable (C) operator (D) compiler
(44). ………………allows creating own exception classes according to application-specific exceptions.
(A) C ++ (B) C (C) Java (D) PHP
(45). User-defined exceptions can be created by creating a subclass of……………Class.
(A) declaration (B) input (C) method (D) exception
(46). A good program must always handle………………… rather than the program being
terminated abruptly.
(A) declaration (B) inputs
(C) methods (D) exceptions
(47). Advantage of using exception-handling in java programs is…………………
(A) assertion can be used to debug the program before deploying it to the clients.
(B) it provides an easy mechanism to log various run-time error while executing the program.
(C) both (A) and (B)
(D) none of these
(48). A throws clause can be used in the following manner:
(A) Method_Modifiersmethod_Name ([arameters) throws Exception list. . .{………… // body of
the method……………}
(B) Method_Modifiersreturn_typemethod_Name(parameters) throws Exception list . . .{……
……//body of the method………}
(C) return_typemethod_Name (parameters) throws Exception list. . .{………// body of the
method……}
(D) none of these
(49). The statement “throw myobject;”………………………
(A) Throws the exception object implicitly
(B) Throws the exception object explicitly
(C) Throws The object implicitly
(D) None of these
(50). The finally block is executed when an exception is thrown, even if no catch matches it.
Choose the correct option.
(A) True (B) False (C) Can’t say (D) None of these
(51). . Choose the correct option.
(A) True (B) False (C) Can’t say (D) None of these
(52). Which of the following is true about try/catch blocks in java ?
I. All try/catch blocks must have a finally block.
II. A try/catch block is limited to two or less catch blocks.
III. Barring the java virtual machine from exiting, the finally block will always be executed.
(A) ( I) and (III) (B) (I) only (C) (I) only (D) (I) and (II)
(53). The key words used with exception handling are
(A) generate, handled, conclude (B) generate, catch, finally
(C) throw, catch, conclude (D) try, catch, finally
(54). When an array is accessed beyond the array size , …… exception in thrown.
(A) Array ElementOut Of Limit
(B) Array Index Out Of Bounds Exception
(C) Array Index Out Of Bounds
(D) Array ElementOutOf Bounds

Mahesh Sir - 9724665284 PAGE NO: 87 App : Clear Code Technical Technical
(55). Which of the following is the most important to know if you want to be able to use a method
to its full potential?
(A) The method’s return type
(B) The type of arguments the method requires
(C) The number of statements within the method
(D) The type of Exceptions the method throws
(56). It is usually understood that a compiled program is error free and will always……………
successfully.
(A) complete (B) execute (C) perform (D) accomplish
(57). The …… in a program results in an abnormal execution and it may lead to abnormal
termination and it may lead to abnormal termination of the program.
(A) exception (B) error (C) message (D) mistake
(58). An exception usually signals an……… .
(A) Exception (B) inaccuracy (C) error (D) e-fault
(59). ……….handling allows a program to continue executing as if no problem had been
encountered or it may notify the user of the problem before terminating in an uncontrolled manner.
(A) Data (B) Program (C) Error (D) Exception
(60). In java, all kinds of error conditions are called ……….. .
(A) methods (B) programs (C) errors (D) exceptions
(61). ………….is type of error produced in java programs.
(A) Compile-time errors (B) Run-time errors
(C) B oth (A) and (B) (D) None of these
(62). A compiler is used to convert…… code into object code.
(A) home (B) source (C) beginning (D) program
(63). Examples of some common syntax errors are missing like a….. .
(A) semicolon (B) use of undeclared variable
(C) wrong spellings of identifier or keyword (D) all of these
(64). Compile-time…….. are usually the mistake of a programmer and it does not allow the
program to compile unless they are solved.
(A) methods (B) programs (C) errors (D) exceptions
(65). Code…… indicates that the command executed successfully.
(A) 1 (B) -1 (C) 0.0 (D) 0
(66). If there are no syntax errors in the source code then the program will compile successfully
and will get a…….. file.
(A) .source (B) .dat (C) .class (D) .obj
(67). for each type of exception, there are corresponding…….. classes in java.
(A) programs (B) exceptions (C) java.lang (D) java.io
(68). An attempt to access the array element with an index value that is outside the range of
array uses……. Exception class.
(A) ArrayIndexOutOfBoundsException (B) ArithmeticException
(C) FileNotFoundException (D) All of these
(69). An attempt to access a non-existing file uses …….. exception class.
(A) ArrayIndexOutOfBoundsException (B) ArithmeticException
(C) FileNotFoundException (D) All of these
(70). An attempt to convert string to a number type uses…….Exception class.
(A) PrinterIOException (B) NullPointeException
(C) NumberFormatException (D) None of these
(71). What is the full form of JVM ?
(A) Java Virtual Mechanism (B) Java Virtual Method
(C) Java Virtual Machine (D) Java Virtual Manner
(72). ………….handling is an object-oriented technique for managing errors.
(A) Allowance (B) Error (C) Exclusion (D) Exception
(73). Java uses keywords like……… to write an exception handler.
(A) try (B) catch (C) finally (D) all of these

Mahesh Sir - 9724665284 PAGE NO: 88 App : Clear Code Technical Technical
(74). A……….. contains the code that may give rise to one or more exceptions.
(A) Try block (B) catch block
(C) finally block (D) all of these
(75). A……….. is always executed before the program ends, regarding of whether any
exceptions are generated in the try block or not.
(A) try block (B) catch block
(C) finally block (D) all of these
(76). A……….. block may give rise to one or more exceptions.
(A) try (B) catch
(C) finally (D) none of these
(77). The……… must immediately follow the try block.
(A) try block (B) catch block
(C) finally block (D) all of these
(78). The ……….is an exception handler.
(A) try block (B) catch block
(C) finally block (D) all of these
(79). A catch block consists of the keyword catch followed by a single…………..
(A) operator (B) method (C) block (D) parameter
(80). The…….. identifies the type of exception that the block is to deal with.
(A) operator (B) method (C) block (D) parameters
(81). Any program which tries to access array element by specifying index position that is
outside the range leads to an…. .
(A) illegal message (B) exclusion (C) error (D) exception
(82). A corresponding ………… handles the above exception and does not allow the program to
terminate unexpectedly.
(A) try block (B) catch block (C) finally block (D) all of these
(83). In a single program………exceptions can occur.
(A) various (B) single (C) multiple (D) some
(84). If a particular file has to be uploaded to a remote computer, and exception may occur if the
file is not present in the…………….
(A) computer (B) network (C) internet (D) system
(85). There is a provision in java to support…………… exceptions.
(A) Various (B) single (C) multiple (D) some
(86). There can be multiple…………… to handle each type of exception separately.
(A) try blocks (B) catch blocks (C) finally blocks (D) all of these
(87). The……………… catch block, must be the last block when there are multiple catch blocks.
(A) first (B) second (C) third (D) default
(88). …………… try blocks can be nested together, but care must be taken to write a
corresponding catch block for each try block.
(A) Various (B) Single (C) Multiple (D) Some
(89). A…………… is used when the programmer wants to be sure that some particular code is to
be run, no matter what exceptions are thrown within the associated try block.
(A) try block (B) catch block (C) finally block (D) all of these
(90). A……… is widely used if a file needs to be closed or a critical resource is to be released at
the completion of the program.
(A) try block (B) catch block (C) finally block (D) all of these
(91). However, in the presence of………… the program executes the statements within the finally
block before it gets terminated.
(A) try block (B) catch block (C) finally block (D) all of these
(92). If these are no …………………, then the finally block can be positioned immediately after
the try block.
(A) try blocks (B) catch block (C) finally block (D) all of these
(93). The………………… keyword is used to explicitly throw an Exception object.
(A) Throws (B) throws (C) throw (D) Try

Mahesh Sir - 9724665284 PAGE NO: 89 App : Clear Code Technical Technical
(94). Java does provide mechanism to create an ……………… object and throw it explicitly.
(A) illusion (B) exclusion
(C) error (D) exception
(95). The syntax to throw an exception object is ………………….
(A) throw exception_object; (B) throws exception_object;
(C) throwsexception_object (D) throw object;
(96). Any subsequent statements in the……………………… are not executed.
(A) try block (B) try or catch block
(C) catch block (D) try or finally block
(97). A…..clause can be used in a method declaration or constructor declaration to inform that
the code within the constructor or method may throw an Exception.
(A) Throwable (B) Throws
(C) throw (D) throws
(98). The…………………… keyword is used with the declaration of method.
(A) Throwable (B) Throws
(C) throw (D) throws
(99). Each type of………………… that a method can throw must be start in the method header.
(A) declaration (B) variable
(C) error (D) exception
(100). ……..does not provide built-in exception classes for application specific exceptions.
(A) C++ (B) C
(C) Java (D) PHP
(101). If the ……………………… accepts data from the keyboard, it is advisable to execute the
program at command prompt.
(A) program (B) application
(C) user (D) compiler
(102). Advantage of using exception-handling in java programs is………..
(A) it allows maintaining normal flow of program. In the absence of exception handling, the
flow of program is disturbed.
(B) it allows writing separate error handling code from the normal code.
(C) error types can be grouped an differentiated within the program.
(D) A ll of these
(103). Which of the following is the correct syntax in a user defined exception ?
(A) catch(InvalidMarksExceptioneobj)
(B) catch(ArithmeticExceptioneobj)
(C) catch (ArrayIndexOutOfBounds e)
(D) all of these
(104). A method header can be like ………………
(A) performDivision throws Arithmetic Exception. ArrayIndexOutOfBoundsException{ . . . .
.//body of the method ……}
(B) performDivision() throws Arithmetic Exception, ArrayIndex
ArrayIndexOutOfBoundsException
(C) performDivison() throws Arithmetic Exception, { . . . . .//body of the method ……}
(D) performDivison() throws Arithmetic Exception, ArrayIndexOutOfBoundsException { . . . .
.//body of the method ……}
(105). Which of these keywords must be used to monitor for exceptions ?
(A) T ry (B) Finally
(C) Throw (D) Catch
(106). Exceptions can be caught or re-thrown to a calling method. Choose the correct option.
(A) True (B) False
(C) Can’t say (D) None of these
(107). Which of these keywords is not a part of exception handling ?
(A) Try (B) Finally
(C) Thrown (D) Catch

Mahesh Sir - 9724665284 PAGE NO: 90 App : Clear Code Technical Technical
(108). What will be the output of the program ?
public class Test
{
public static void main(String [ ] args)
{
try
{
return;
}
Finally
{
system.out.println(“Finally”);
}
}
}
(A) Finally
(B) Compilation fails
(C) The code runs with no output
(D) An exception is thrown at runtime
(109). What happen behind the code int a=50/0 ?
(A) Object of exception class thrown
(B) Error in Code
(C) Error message
(D) None of these
(110). What is the output of this program ?
classexception_handling{
Public static void main(String args [ ])
Try {
int a, b;
b = 0;
a = 5 / b;
System.out.print(“A”); }
Catch(ArithmeticException e) {
System.out.print(“B”);
}}
(A) A
(B) B
(C) Compilation error
(D) Runtime error

Mahesh Sir - 9724665284 PAGE NO: 91 App : Clear Code Technical Technical
File Handling
Total Marks: 6
(1). ……… storage is temporary.
(A) Volatile (B) Non-volatile (C) Movable (D) Immovable
(2). A java program that stores a value in a….. Uses Random Access Memory (RAM).
(A) cell (B) program (C) variable (D) all of these
(3). Once the program terminates or the computer shuts down, the data is…………..form RAM>
(A) stored (B) lost (C) available (D) Accessible
(4). Data is not……. When a computer loses power in a Non-volatile storage.
(A) stored (B) lost (C) available (D) accessible
(5). A computer……… is a collection of data stored on a non-volatile device.
(A) file (B) desktop (C) directory (D) device
(6). Data stored in files is often called……… data.
(A) text (B) persistent (C) informative (D) binary
(7). ………files contain data that can be read In a text editor.
(A) Text (B) Manuscript (C) Memo (D) Binary
(8). ………. files can be data files that contain facts, such as payroll file that contains employee numbers, names
andsalaries.
(A) Binary (B) Memo (C) Program (D) Text
(9). ………….are examples of editors through which text files can be created.
(A) gedit (B) vi (C) pico (D) a ll of these
(10). …………. Files contain data that has not been encoded as text.
(A) Binary (B) Memo (C) Informative (D) Text
(11). The binary files extensions example are…………..
(A) jpeg (B) mp3 (C) class (D) all of these
(12). ………….. operations that can be performed on files using java programs.
(A) Determining the path of a file or a directory (B) Opening a file
(C) Writing to a file (D) All of these
(13). Java provides built-in……… that contain methods to help with the tasks related to files.
(A) variables (B) packages (C) classes (D) devices
(14). Java uses the concepts of ………..in file handling.
(A) file systems (B) streams (C) packages (D) classes
(15). Which of the following is not a Binary file extension ?
(A) jpeg (B) mp3 (C) class (D) txt
(16). The….. class encapsulates information about the properties of a file or a directory.
(A) j ava.io.file (B) java.oi.file (C) java.util.io (D) java.io.util
(17). A programmer can do……..a file or a directory.
(A) create (B) rename (C) delete (D) all of these
(18). the…… creation of a file object that belongs to ……..class does not imply that the file or directory exists.
(A) file (B) I/O (C) java (D) util
(19). There are nearly ……….. that can be used to perform various operations on a file or a directory.
(A) 25 methods (B) 30 methods (C) 35 methods (D) 20 methods
(20). There are several …………classes to perform to read from a file or write into a file.
(A) file (B) stream (C) package (D) object
(21). The file class provides……….constructors to refer a file or a directory.
(A) File (String path) (B) File (String directory_path, String file_name)
(C) File (File directory, String file_name) (D) All of these
(22). Suppose one wants to display its attributes, then its java file object can be created using ……….ways.
(A) one (B) two (C) three (D) four
(23). ………..method of file class returns true if the file exists, otherwise returns false.
(A) boolean exists ( ) (B) booleanisFile ( ) (C) booleanisDirectory ( ) (D) booleanisHidden( )
Mahesh Sir - 9724665284 PAGE NO: 92 App : Clear Code Technical Technical
(24). ………… method of file class returns true if the file of directory is hidden.
(A) boolean exists ( ) (B) booleanisFile( ) (C) booleanisDirectroy( ) (D) booleanisHidden( )
(25). …………method of file class returns the name of the file or directory referred by the object.
(A) String [ ] list ( ) (B) String getPath ( )
(C) StringgetName ( ) (D) String getAbsolutePath ( )
(26). ……….method of file class returns the name of the files and directories in a directory.
(A) String [ ] list ( ) (B) String getPath ( )
(C) String getName ( ) (D) String getAbsolutePath ( )
(27). ………… method of file class returns an array of abstract pathnames denoting the files in the directory.
(A) Long length ( ) (B) File [ ] listFiles( ) (C) Both (A) and (B) (D) None of these
(28). To modify a file or display the contents of a file, the concept of…….. has to be understood.
(A) files (B) streams (C) packages (D) objects
(29). ………is an input device.
(A) Monitor (B) Speaker (C) Keyboard (D) Plotter
(30). ……….can be classified as both input and output device as data can be stored and read from the files.
(A) Monitor (B) Speaker (C) Keyboard (D) Hard disk
(31). ………..can be connected using different cables like USB or SATA.
(A) Hard disk (B) Scanner (C) Printer (D) Mouse
(32). The above point is possible because java language provides functionality of……
(A) files (B) streams (C) directories (D) objects
(33). Visualize a…….. as a sequence of bytes that flows into the program or that flows out of the program.
(A) file (B) directory (C) stream (D) disk
(34). When data Is written to stream, the stream is called an……… .
(A) output stream (B) input stream (C) I/O stream (D) Both (A) and (B)
(35). An……… is used to read data form an external device to the program.
(A) output stream (B) input stream (C) I/O stream (D) Both (A) and (B)
(36). The main reason for using streams for input or output operations is to make our program independent of
the………involved.
(A) hard Disks (B) keyboards (C) printers (D) devices
(37). To understand byte streams and character streams, one needs to differentiate between character and
byte………….
(A) representation (B) collection (C) numbers (D) particulars
(38). If ‘5’ is represented as a character, its binary representation will be…… .
(A) 53 (B) 5 (C) 101 (D) 00110101
(39). If ‘5’ is represented as a binary number, then its binary representation will be………… .
(A) 00000101 (B) 11001100 (C) 10101100 (D) 11111000
(40). In the statement int I = 32, the……… is true.
(A) Declares ‘i’ as an integer type variable (B) That ‘i’ stores number 32.
(C) Both (A) and (B) (D) None of these
(41). For numerical calculations, data types like int, float or double are used, that allows storing the numbers
in………format.
(A) numbers (B) text (C) character (D) b inary
(42). ………transfer data in the form of bytes to the file or devices are known as byte stream of binary stream.
(A) Streams (B) Files (C) Data flow (D) Commands
(43). If variables are to be stores like integer, double or Boolean into a file, then ……..files should be used.
(A) byte (B) text (C) character (D) binary
(44). Similarly text files and program codes are created using………. stream.
(A) byte (B) character (C) both (A) and (B) (D) none of these
(45). Java provides ……….set of classes, character stream class and binary stream class.
(A) one (B) two (C) three (D) four
(46). Java streams can be classified into…….. basic types.
(A) one (B) two (C) three (D) four
(47). The……….. stream reads data from the source (file, keyboard)
(A) stream (B) byte (C) output (D) character

Mahesh Sir - 9724665284 PAGE NO: 93 App : Clear Code Technical Technical
(48). The…….. package contains a collection or stream classes that support reading and writing in a file.
(A) j ava. io (B) java.package (C) java.utill (D) all of these
(49). Character stream classes can be used to read and write………. Unicode characters.
(A) 8bit (B) 16bit (C) 32bit (D) 64bit
(50). …………classes are a group of classes designed to read characters from files.
(A) Writer (B) R eader (C) Output (D) Input
(51). Writer classes are inherited from the………… class.
(A) object (B) writer (C) reader (D) character
(52). InputStreamReader and BufferedReader are the subclass of……class.
(A) object (B) writer (C) reader (D) character
(53). OutputStream Writer, bufferedWriter and printWriter are the subclasses of ……….class.
(A) object (B) writer (C) reader (D) character
(54). Writer class is the ………… for writing a character stream.
(A) superclass (B) sub.oi (C) subclass (D) baseclass
(55). Methods of………….class are used by its subclasses.
(A) writer (B) object (C) reader (D) character
(56). The writer method ………….writers string ‘s’ to the stream.
(A) void writer(int C) (B) void close() (C) void write (String s) (D) All of these
(57). The OutputStream…….. class extends Writer class.
(A) writer (B) object (C) reader (D) character
(58). The FileWriter class extends …………Writer and outputs characters to a file.
(A) InputStream (B) OutputStream (C) ReaderStream (D) WriterStream
(59). Which of the following constructor is of FileWriterClass ?
(A) FileWriter (String filepath) (B) FileWriter (File fileobj)
(C) FileWriter (String filepath, Boolean append) (D) All of these
(60). In the following example an object of……. Can be created.
FileWriterfwobject = new FileWriter (“/java/files/Charfile1.txt”);
(A) FileStream (B) FileWriter (C) FileReader (D) FileDemo
(61). ……………files consume system resources and depending on the file mode.
(A) Closed (B) Large (C) Small (D) Open
(62). The abstract……..class defines the functionality that is available for all character input streams.
(A) object (B) reader (C) file (D) directory
(63). …………method of Reader class closes the stream.
(A) void close () (B) int read() (C) void read() (D) None of these
(64). The InputStreamReader class extends ………..class.
(A) stream (B) writer (C) reader (D) demo
(65). The……….. class extends InputStramReader class and reads characters from a file.
(A) FileStream (B) FileWriter (C) FileReader (D) FileDemo
(66). Which of the following is not a FileReader constructor?
(A) FileReader (String filepath) (B) FileReader (File fileobj)
(C) Both (A) and (B) (D) FileReader (I, int j)
(67). ………….is a special symbol to identify end of file.
(A) /* */ (B) EOF (C) // (D) }
(68). The java……..method returns “-1” to identify the end of data in the stream.
(A) close() (B) read() (C) print() (D) write()
(69). The above mentioned streams are the sub-classes of……….. and ………classes.
(A) ReaderStream (B) InputStream (C) OutputStream (D) Both (B) and ©
(70). ………method of FileOut[itStream class closes the file output stream and releases any system
resourcesassociated with the stream.
(A) void write (int b) (B) void close ()
(C) void write (byte[] b) (D) void write (byte[] b)
(71). …………..method of FileOutputStream class writes b.length bytes from the specified byte array to this
fileoutput stream.
(A) void write(int b) (B) void close() (C) void writer(byte[] b) (D) void read()

Mahesh Sir - 9724665284 PAGE NO: 94 App : Clear Code Technical Technical
(72). The constructor FileOutputStream (String name) throws…………..
(A) FileOutofBoundsException (B) FileNotFoundException
(C) FileFoundException (D) None of these
(73). The following example will create an instance of……….
FileOutputStreamfosobject = new
FileOutputStream (“/home/Akash/myfile.txt”);
(A) FileOutputStream (B) FileInputStream
(C) FileReaderStream (D) FileConstructor
(74). ………….method of FileInputStream class reads a byte of data from this input stream.
(A) void close ( ) (B) int read(byte[ ] b) (C) int read ( ) (D) void write ()
(75). ……………. Method of FileInputStream class reads up to b.length bytes of data from this input stream into
anarray of bytes.
(A) void close( ) (B) int read (byte[ ] b) (C) int read ( ) (D) void write ( )
(76). …………..class belongs to the java.util package.
(A) Printer (B) Console (C) Scanner (D) Keyboard
(77). A special feature of this class is that it breaks the input string into tokens (words) using a……..
(A) delimiter (B) printer (C) console (D) White space
(78). Each………. Can be of different type, for example a string like “india-1947” can also be read as “String-
int”values.
(A) symbol (B) token (C) word (D) mark
(79). A………. object can be created from a strng, file object or inputStream object.
(A) Printer (B) Console (C) Scanner (D) Keyboard
(80). The method ……..of scanner class returns the next token.
(A) Void close() (B) String next() (C) Boolean has next() (D) Intnextitn()
(81). The method…….of scanner class scans the next token of the input as int.
(A) Void close() (B) String next() (C) Boolean has next() (D) Intnextitn()
(82). The method……… of scanner class scans the next token of the input as line.
(A) floatnextFloat ( ) (B) string next( )
(C) Boolean hasNext() (D) String nextline ( )
(83). The………… class is especially used when the input is to be types in hidden form (characters must not
beechoed on the screen.)
(A) Printer (B) Console (C) Scanner (D) keyboard
(84). The console class belong to….. package.
(A) Java.io (B) Java.util (C) Java.class (D) Java.console
(85). …………method of Console class reads a single line of text from the console.
(A) String readLine ( ) (B) char [ ] readPassword ( )
(C) Console printef(String format, Object args) (D) None of these
(86). Scanner class is used for performing which of the following operations ?
(A) Read from a file (B) Navigate through a file
(C) Scan a file (D) All of these
(87). Storage devices of a computer can be broadly classified into……. Categories.
(A) One (B) two (C) three (D) four
(88). In……. storage values stored in variables are lost when a computer is shutdown.
(A) Volatile (B) non-volatile (C) movable (D) immovable
(89). Apart from variables, objects and their references are generally stored in………..
(A) ROM (B) PROM (C) RAM (D) Hard Disk
(90). ……. storage is permanent storage.
(A) Volatile (B) Non-volatile (C) Movable (D) Immovable
(91). When a java program Is saved on a disk, it is using…….. storage.
(A) temporary (B) provisional (C) conditional (D) perrmanent
(92). ………..exist on permanent storage devices, such as hard disks, USB drives, optical disks and compact discs.
(A) Files (B) Manuals (C) Directories (D) Devices
(93). Files can be further classified broadly into ……….categories.
(A) one (B) two (C) three (D) four

Mahesh Sir - 9724665284 PAGE NO: 95 App : Clear Code Technical Technical
(94). In the ………files the data has been encoded using a scheme such as ASCII or Unicode.
(A) text (B) memo (C) information (D) binary
(95). Some………..files can be program files or application files that store software instructions.
(A) binary (B) memo (C) program (D) text
(96). The extensions of the files created through the above editor can have an extension like …………
(A) txt (B) java (C) c (D) All of these
(97). The contents of a…… files are in binary format, which means the data is accessed in terms of bytes.
(A) binary (B) memo (C) informative (D) text
(98). Java language supports various operations that can be performed on file or on………….
(A) programs (B) attributes (C) directories (D) queries
(99). ………operations that can be performed on files using java programs.
(A) Reading from a file (B) Closing or deleting a file
(C) Querying the attributes of file (D) All of these
(100). The java classes are present in package.
(A) java.bytes. (B) java.io (C) java.util (D) java.method
(101). Java provides ………..different categories of java classes to perform I/O operations on bytes and characters.
(A) one (B) two (C) three (D) four
(102). Which of the following is not a text file extension ?
(A) txt (B) java (C) jpeg (D) c
(103). ………class can be used to access attributes of files and directors.
(A) File (B) I/O (C) java (D) util
(104). The……… of a file can also be accessed like its permissions, length of a file or last modification time.
(A) features (B) attributes (C) qualities (D) traits
(105). A file ………… encapsulates a pathname or reference to a physical file or a directory on the hard disk.
(A) method (B) class (C) object (D) handler
(106). ………….. does not provide any methods to read from a file or write into a file.
(A) File class (B) File methods (C) File object (D) File operator
(107). By using the file class, one can create a……….. to any file by providing its absolute path in string format or
byproviding the relative path.
(A) location (B) reference (C) stream (D) object
(108). In Linux, “passwd” file is present in………. directory stores the information of the users existing in the
system.
(A) “ /etc” (B) “/pwd” (C) “/file” (D) “/dir”
(109). …………method of file class returns true if the file or directory exists, otherwise returns false.
(A) boolean exists ( ) (B) booleanisFile ( )
(C) booleanisDirectory ( ) (D) booleanisHidden ( )
(110). ……….method of file class returns true if the directory exists, otherwise false.
(A) boolean exists( ) (B) booleanisFile( )
(C) booleanisDirectory( ) (D) booleanisHidden( )
(111). ………..method of file class returns the absolute path of the file exists or directory.
(A) String [ ] list ( ) (B) String getPath ( )
(C) String getName ( ) (D) StringgetAbsolutePath ( )
(112). ………..method of file class returns the path to the file or directory.
(A) String [ ] list ( ) (B) StringgetPath ( )
(C) String getName ( ) (D) String getAbsolutePath ( )
(113). …………method of file class returns the number of bytes in that file.
(A) Long length( ) (B) File [ ] listFiles ( )
(C) Both (A) and (C) (D) None of these
(114). ……….method to list the files present in a directory.
(A) display () (B) list( ) (C) dir() (D) files()
(115). Java uses……classes to carry out read and write operations on files.
(A) files (B) streams (C) packages (D) Objects
(116). ………is an output device.
(A) Monitor (B) Speaker (C) Keyboard (D) Plotter

Mahesh Sir - 9724665284 PAGE NO: 96 App : Clear Code Technical Technical
(117). …………..are manufactured by various companies and come with different storage capacities like 500GB
or 1TB.
(A) Monitor (B) Speaker (C) Keyboard (D) H ard disk
(118). A java programmer does not need to worry about the technical details like type of………. Or its capacity
whiledeveloping a program to perform read / write operations over the files.
(A) hard disk (B) scanner (C) printer (D) mouse
(119). A……… is an abstract representation of an input or output device that is used as a source or destination for
data.
(A) file (B) directory (C) stream (D) disk
(120). One can write data or read data using………..
(A) files (B) streams (C) directories (D) objects
(121). The ……… can transfer data from the program to a file on a hard disk or a monitor or to some other
computerover the network.
(A) output stream (B) input stream (C) I/O stream (D) Both (A) and (B)
(122). ………can transfer data from keyboard or from the file on a hard disk to the program.
(A) Output stream (B) Input stream
(C) I/O stream (D) Both (A) and (B)
(123). ………is advantage of using streams.
(A) Programmer does not need to worry about the technical details of the device.
(B) The program can work for a variety of input/output devices without any changes to the source code.
(C) Both (A) and (B)
(D) None of these
(124). If ‘5’ is represented as a character, its ASCII value will be…. .
(A) 51 (B) 52 (C) 53 (D) 54
(125). If ‘5’ is represented as a binary number, then its binary representation will be………
(A) 53 (B) 5 (C) five (D) 101
(126). A character is generally stored using ASCII or Unicode format but when it is used for calculation purpose
butwhen it is used for calculation purpose and then it’s ……..value is meaningful.
(A) binary (B) actual (C) objective (D) text
(127). The number 32 can be represented as two separate…….. ‘3’ and ‘2’.
(A) numbers (B) values (C) characters (D) all of these
(128). Java supports two types of streams,…………. Streams and …….stream.
(A) byte (B) character (C) both (A) and (B) (D) none of these
(129). T he files that are created using……… stream are known as binary files.
(A) byte (B) character (C) both (A) and (B) (D) none of these
(130). ……..files can also be used to store arrays or objects.
(A) Byte (B) Text (C) Character (D) B inary
(131). Text files and program codes can be opened in text editors like vi and SciTE.
(A) SciTE (B) vi (C) Both (A) & (B) (D) None of these
(132). Character Stream classes are present in java.io package deal with the……….. text data.
(A) byte (B) character (C) both (A) and (B) (D) none of these
(133). Java streams are namely input stream and ………stream.
(A) stream (B) byte (C) output (D) character
(134). The……… stream writes data to the destination (file,outputdeveice).
(A) stream (B) byte (C) output (D) character
(135). …………..stream classes are a group of classes available in java. io package.
(A) Input (B) Byte (C) Output (D) Character
(136). ……..stream classes can be further classified into reader and writer classes.
(A) Input (B) Byte (C) Output (D) Character
(137). The……… classes are a group of classes designed to write characters into a file.
(A) writer (B) reader (C) character (D) byte
(138). Writer classes are…………classes (classes that cannot be used to create an object) and come with set
ofmethods to be implemented by its subclasses.
(A) intellectual (B) abstract (C) byte (D) java.io

Mahesh Sir - 9724665284 PAGE NO: 97 App : Clear Code Technical Technical
(139). ………….class is the subclass of InputStreamReader class.
(A) FileReader (B) FileWriter (C) FileJava (D) JavaFile
(140). FileWriter class is the….. ofOutputStream Writer class.
(A) superclass (B) sub.io (C) subclass (D) baseclass
(141). The abstract …………class defines the functionality that is available for all character output stream.
(A) object (B) writer (C) reader (D) character
(142). The writer method…………. Closes the stream.
(A) void writer(int C) (B) void close() (C) void writer (String s) (D) All of these
(143). The writer method……… writes the lower 16 bits of ‘c’ to the stream.
(A) void write(int C) (B) void close() (C) void writer (String s) (D) All of these
(144). The……. Converts stream of characters to a stream of bytes.
(A) InputStream (B) OutputStream (C) ReaderStream (D) WriterStream
(145). The FileWriter class has……… constructor which throws IOException
(A) FileWriter (String filepath) (B) FileWriter (File fileobj)
(C) FileWriter (String filepath, Boolean append) (D) All of these
(146). In the constructor “………”. If append is true, characters are appended to the end of file, otherwise the
existingcontents of the file are overwritten.
(A) FileWriter (String filepath)
(B) FileWriter (File fileobj)
(C) FileWriter (String filepath, Boolean append)
(D) None of these
(147). It is important to close the stream…….. after writing to a file is accomplished.
(A) object (B) reader (C) file (D) directory
(148). …………..class Is the base class for reading a character stream.
(A) Object (B) Reader (C) File (D) Directory
(149). ………….class should be use in program to perform read operations.
(A) FileStream (B) FileWriter (C) FileReader (D) FileDemo
(150). …………..method of reader class, reads next available character from the stream, it returns “-1” to indicate
theend of stream.
(A) void close () (B) int read() (C) void read() (D) None of these
(151). ………..class converts a stream of bytes to a stream of characters.
(A) Stream (B) Writer (C) Reader (D) Demo
(152). Which of the following is a FileReaderconstructor ?
(A) FileReader (Strignfilepath) (B) FileReader (File fileobj)
(C) Both (A) and (B) (D) None of these
(153). In the following example – an object of …….. can be created.
FileReaderfrobject = new FileReader (“/java/files/Charfile1.txt”);
(A) FileReader (B) FileWriter (C) Both (A) and (B) (D) FileDemo
(154). ………..is a special symbol to identify end of file.
(A) program (B) code (C) class (D) method
(155). The………. and ……….. classes in the java.io package, give the ability to read and write from and into files
inthe disk.
(A) FileInputStream (B) FileOutputStream
(C) FileReaderStream (D) Both (A) and (B)
(156). The file……… is a subclass of OutputStream class closes the file output stream and release any
systemresources associated with the stream.
(A) ReaderStream (B) InputStream
(C) OutputStream (D) Both (B) and (C)
(157). …………..method of FileOutputStream class writes the specified byte to this file output stream.
(A) void write (int b) (B) void close () (C) void write (byte[] b) (D) void write (byte[] b)
(158). The constructors of………..can accept either a string containing the path to the file location or an object of
thefile class.
(A) FileOutputStream (B) FileInputStream
(C) FileReaderStream (D) FileConstructor

Mahesh Sir - 9724665284 PAGE NO: 98 App : Clear Code Technical Technical
(159). The constructor FileOutputStream (File file) throws…….. .
(A) FileOutofBoundsException (B) FileNotFoundException
(C) FileFoundException (D) None of these
(160). The……. Is a subclass of InputStream and is generally used to read byte data from the files.
(A) FileInputStream (B) FileReaderStream
(C) FileWriterStream (D) FileOutputStream
(161). ……………..method of FileInputStream class closes the file input Stream and releases any system
resourcesassociated with the stream.
(A) void close ( ) (B) int read(byte[ ] b)
(C) int read ( ) (B) void write ()
(162). A………….. can get input from live interaction through keyboard /GUI or it may take input as command
linearguments or from the files.
(A) program (B) code (C) class (D) method
(163). It provides various methods to real input from the……or from the file.
(A) printer (B) console (C) scanner (D) keyboard
(164). ……………is the default delimiter.
(A) Delimiter (B) Printer (C) Console (D) White space
(165). which of the following is not a scanner related constructor of method ?
(A) scanner (String str) (B) scanner (inputStreamisobject)
(C) scanner (file fobject) (D) scanner (files i)
(166). The method …….of scanner class closes the scanner.
(A) Void close() (B) String next()
(C) Boolean has next() (D) Intnextitn()
(167). The method …….of scanner class scan the next token of the input as Int.
(A) Void close() (B) String next()
(C) Boolean has next() (D) Intnextitn()
(168). The method……… of scanner class scans the next token of the input as Float.
(A) floatnextFloat ( ) (B) string next( )
(C) Boolean hasNext() (D) String nextline ( )
(169). ………..class can also be used to read from a file.
(A) Printer (B) Console (C) Scanner (D) Keyboard
(170). The…….class provides a method for reading password.
(A) Printer (B) Console (C) Scanner (D) Keyboard
(171). ………..method of Console class is used to write a formatted string to this console’ output stream using
thespecified format string and arguments.
(A) String readLine( )
(B) char [ ] readPassword ( )
(C) Console printf(String format, Object args)
(D) None of these
(172). ………method of Console class reads a password or passphrase from the console with echoing disable.
(A) String readLine ( )
(B) char [ ] readPassword ( )
(C) Console printef(String format, Object args)
(D) None of these
(173). Which of the following is correct syntax ?
(A)Public static void main (String args[])
(B) Public static void main (String args)
(C)public static void main (String args[])
(D) Public static void main (String args[])

Mahesh Sir - 9724665284 PAGE NO: 99 App : Clear Code Technical Technical
Publishing Documents Using LaTeX
Total Marks: 6
(1). Most LaTexdistriubution software includes ………..and some additional software in them.
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(2). While using LaTex, there is also a need for plain…………editor and software to view the output file.
(A) text (B) transcript (C) script (D) word
(3). depending on the output of file……….. corresponding viewer software is needed.
(A) arrangements (B) formats (C) editors (D) software’s
(4). ………….are examples of plain text editors.
(A) Gedit (B) SciTE (C) Both (A) and (B) (D) none of these
(5). ………….command is used to define the document’s title.
(A) \title (B) \author (C) \date (D) \document
(6). ……….command is used to specify the date the document was created.
(A) \title (B) \author (C) \date (D) \document
(7). LaTeX comes with …….ways to format these document elements in a pleasant looking professional style.
(A) integrated (B) built-in (C) many (D) incorporated
(8). The document is compiled (processed) using the LaTeX…………and an output file is produced.
(A) organization (B) commands (C) system (D) document
(9). The produced additional files can be ……..safely without losing any information .
(A) read (B) deleted (C) saved (D) documented
(10). In the output file, if the looks of the document are not satisfactory , it can be further…..with the help
Of built-in styles or own styles can be defined.
(A) adapted (B) formatted (C) modified (D) customized
(11). both Tex and LaTeX use the file extension…………
(A) .text (B) .tex (C) .txe (D) .latex
(12). Full form of PDF is…….
(A) perfect document format (B) portable double format
(C) portable document format (D) perfect deed format
(13). PDF files are very popular for sharing…………… document on the web.
(A) producible (B) printable (C) printed (D) scanned
(14). Ubhuntu’s document default viewer is………….
(A) evince (B) LaTeX (C) Evine (D) all of these
(15). The LaTeX document can be compiled by issuing the command……..at the command prompt.
(A) gedit (B) word (C) wordpad (D) getit
(16). The generated PDF file can be viewed by opening it from the……..
(A) Desktop (B) GUI (C) Adobe (D) latex
(17). sciTE editor can be also be used for editing………. files.
(A) evience (B) latex (C) basic (D) gedit
(18). To use scite with pdflatex, there is a need to make changes in its……file.
(A) document (B) PDF (C) configuration (D) LaTeX
(19). theLaTeX source consists of plain text with some parts fo the text marked up using markers known as…….
(A) instructions (B) commands (C) guidelines (D) direction
(20). The LaTeX commands can perform a variety of tasks when the ……is processed by the LaTeX system
(A) organization (B) file (C) system (D) document
(21). theLaTeX commands indicate the role of the marked text in the overall structure of the marked text in
theoverall structure of the ………
(A) organization (B) file (C) system (D) document
(22). the LaTeX …….instuctLaTeX to process the document in a cetain way, for example, use a certain pagesize,
start a new chapter only on an odd-numbered page, etc.
(A) instructions (B) commands
(C) guidelines (D) directions
Mahesh Sir - 9724665284 PAGE NO: 100 App : Clear Code Technical Technical
(23). The LaTeX command name can be a……fo alphabetic letters only, or it can be a single non-letter.
(A) string (B) sequence (C) series (D) chain
(24). ……… arguments are not mandatory.
(A) Optional (B) Compulsory (C) Instance (D) Event
(25). more than one optianl argument has to be separated by………….
(A) (:) colon (B) (,) comma (C) (;) semi colon (D) (^) caret)
(26). documentclass ins the…….tof the command.
(A) name (B) optional argument (C) compulsory argument (D) none of these
(27). Article is a…….argument.
(A) name (B) optional (C) compulsory (D) all of these
(28). Latex converts all occurrences of multiple consecutive ……..into a single space character.
(A) special (B) space (C) line (D) whitespage
(29). to insert a break In lines use……….at the end of each line except the last line in the paragraph.
(A) \\ (B) || (C) // (D) !!
(30). Which of the following characters is not a reserved character in LaTaX ?
(A) # (B) & (C) ! (D) $
(31). In LaTeX, ………….quotes are produced by repeating them twice.
(A) single (B) double (C) sets (D) collections
(32). A…………..is enclosed between curly braces { and}.
(A) cluster (B) group (C) set (D) collection
(33). …….are useful for applying few commands to a small amount of text such as a part of a line, few lines or
aparagraph.
(A) Clusters (B) Groups (C) Sets (D) Collections
(34). an……… begins with a \begin { environment-name} command and ends with a \end{environment –
name}command.
(A) area (B) extent (C) envioronment (D) section
(35). Environments can be nested. One………..can be nested inside another.
(A) area (B) extent (C) environment (D) section
(36). In LaTeX, the ………character marks the beginning of a commant.
(A) # (B) % (C) @ (D) $
(37). ………are completely ignored by the compilation process and hence never make it into the output.
(A) Comments (B) Notes (C) Explanations (D) Remarks
(38). The……… contaisn metadata (data about data)
(A) main content (B) information
(C) preamble (D) remarks
(39). Te actual content is always inside the………document, written between \begin ( document) and
\end{document}.
(A) area (B) extent
(C) environment (D) section
(40). Option “article” in document class is used for writing individual ………….
(A) articles (B) books (C) slides (D) letters
(41). option “slides” In document class is used for creating presentation…….
(A) articles (B) books (C) slides (D) letters
(42). option……….in document class is used for generating presentations using beamer package.
(A) articles (B) books (C) slides (D) letters
(43). The most common paper…..in regular office uses are A4, letter and legal.
(A) sizes (B) dimensions
(C) scopes (D) extent
(44). the default alignment of formulas and equation is………..
(A) Left (B) Right .
(C) center (D) justified
(45). the document class declaration is followed by optional ……………declaration.
(A) package (B) class (C) variable (D) formula

Mahesh Sir - 9724665284 PAGE NO: 101 App : Clear Code Technical Technical
(46). There is a large community of LaTeX users who develop new LaTeX package or enhance existing ones
tocater to their own needs and then share them with other over the…………..
(A) Comparative TaX Archive Netwrok (CTAN)
(B) Comprehensive TeX Archive Network (CTAN)
(C) Complete TeX Archive Network (CTAN)
(D) Comprehensive Tex Archive Net (CTAN)
(47). to use one or more packages in our document, there is a need to declare them in the………..as
\usepackage{package-name}.
(A) main content (B) file (C) preamble (D) comments
(48). ……..package contains the advanced math extensions for LaTeX originally developed for the
Americanmathematical society.
(A) geometry (B) amsmath (C) setspace (D) color
(49). ……….. package adds support for multilevel text.
(A) geometry (B) easylist (C) setspace (D) color

(50). …………package has special features for including programming code within the document.
(A) geometry (B) listings (C) setspace (D) color
(51). It is necessary to provide the title and the author if…………has to create an antomatic title.
(A) TeX (B) SciTE (C) latex (D) Ubnutu
(52). ………….piece of information can be supplied in the preamble or as the first thing in the
documentenvironment also.
(A) \title (B) \author (C) \date (D) All of these
(53). A title is automatically generated by LaTeX when it see that …………… command.
(A) \title (B) \maketitle (C) \marktitle (D) \spotitle
(54). The document environment of a book is dividend into……… main parts.
(A) One (B) Two (C) Three (D) Four
(55). The main content of a book has a hierarchical structure, where a book is divided into……….
(A) Chapters (B) Sections (C) Parts (D) Subsections
(56). The chapters are divided into……….
(A) Chapters (B) Sections (C) Parts (D) Subsections
(57). The subsections are divided into……….
(A) Chapters (B) Sections (C) Parts (D) Subsections
(58). The paragraphs are divided into…….
(A) Chapters (B) Sections (C) Parts (D) Subsections
(59). The title has to be displayed in the table of…………
(A) List (B) Details (C) Contents (D) Elements
(60). The parts, chapters, sections are………….. automaticall by latex.
(A) Numbered (B) Listed (C) Displayed (D) Edited
(61). The…………are numbered in Roman numerals (I,II,III, so on).
(A) Chapters (B) Sections (C) Parts (D) Subsections
(62). All chapters after the special……. Command get uppercase numbering (a,b,c, and so on).
(A) \parts (B) \list (C) \appendices (D) \appendix
(63). The page in the ……….. are numbered using roman numerals.
(A) Front matter (B) Back matter (C) Main matter (D) Whole matter
(64). By default elements are assigned number up to level 2 that is up to…….
(A) Chapters (B) Paragraphs
(C) Parts (D) Sub subsections
(65). In example, the command“setcounter{secnumdepth{ {3}”
(A)Ensures that elements up to depth 3 are assigned numbers.
(B) Ensures that elements up to level 3 (subsubsection ) are assigned numbers.
(C) Ensures that elements up to counter 3 (sub counter) are assigned numbers.
(D) Ensures that elements up to secnumdepth 3 are assigned numbers.
(66). ……are an exception as their assigned number does not have a part number and period in front ofthem.
(A) Chapters (B) Sections (C) Parts (D) Subsections

Mahesh Sir - 9724665284 PAGE NO: 102 App : Clear Code Technical Technical
(67). A well-formatted table of contents (TOC) is generated automaticlally from the elements title by
LaTexX when it encounters the command……
(A) \TOC (B) \tableofcontents (C) \tableOC (D) \toContents
(68). TOC default entries can be changed by altering the value of another built-in counter……
(A) todepth (B) tocdepth (C) counterdepth (D) setdepth
(69). LaTeX produces the output file………..
(A) Randomly (B) In line (C) Sequentially (D) Cautiously
(70). In the second run, LaTeX picks up the correct information from the supplementary files in the
beginning to produce the correct………..
(A) TOC (B) Tableofcontent (C) Table (D) Content
(71). In the sciTE editor, the file can be saved using ………..menu option.
(A) File Build (B) File Save (C) File save as (D) File Edit
(72). In the SciTE editor, the shortcut key for compilation is…….
(A) F8 (B) F4 (C) F7 (D) F5
(73). In the SciTE editor, the shortcut key for viewing in the default document viewer by selecting……….…..
menu option.
(A) Tools Edit (B) Tools New (C) Tools Build (D) Tools Go
(74). In LaTeX documents, a paragraph is typed in a continuous flow without pressing ..key.
(A) Tab (B) Enter (C) Shift (D) Delete
(75). LaTeX has a hyphenation algorithm to decide the most appropriate way of breaking the word with a……
(A) Hyphen (-) (B) Tilde (~) (C) Underscore (_) (D) Colon (:)
(76). LaTeX divides font families into…….categories.
(A) One (B) Two (C) Three (D) Four
(77). ...........fonts do not have serifs.
(A) Roman (B) Monospace (C) Script (D) Sans serif
(78). …..fonts are typically used for computer code listings.
(A) Roman (B) Monospace (C) Script (D) Sans serif
(79). Roman font can be used for any text by employing the………. command.
(A) \textrm{text} (B) \textf{text} (C) \texttt{text} (D) None of these
(80). Monospace font can be used for any text by employing the……..command.
(A) \textrm{text} (B) \textf{text} (C) \texttt{text} (D) None of these
(81). The font size can be changed using the command………
(A) \small (B) \normalsize (C) \large (D) All of these
(82). The command ………can be used to add the bold effect to the text.
(A) \textbf (B) \textit (C) \emph (D) All of these
(83). The command ………. Can be used to add the emphasis effect to the text.
(A) \textbf (B) \textit (C) \emph (D) All of these
(84). Superscripts can be created in text mode using the command …….. .
(A) \textsuperscript (B) \textsubscript (C) \fixltx2e (D) None of these
(85). Superscripts and subscripts can be created in the text using the package..
(A) \textsuperscript (B) \textsubscript (C) Fixltx2e (D) None of these
(86). by default, body text alignment is fully……..in LaTeX.
(A) Justified (B) Left (C) Right (D) centered
(87). To achieve right alignment, one has to use the environment …….. .
(A) Flushleft (B) Flushright (C) Center (D) Justify
(88). thefirest line of a paragraph is………..except for the paragraphs immediately following a heading.
(A) margined (B) indented (C) single spaced (D) tabbed
(89). The…….. command is used immediately before a paragraph to explicitly make the first lien unindented.
(A) \tab (B) \para (C) \indent (D) \noindent
(90). the…… package provides a listing environment with one mandatory argument line-number-of-first-linefor
program code listing with line numbers.
(A) Verbatim (B) moreverb (C) listing (D) newline
(91). Page……… have been standardized internationally.
(A) Sizes (B) Length (C) Width (D) Dimension

Mahesh Sir - 9724665284 PAGE NO: 103 App : Clear Code Technical Technical
(92). The page size of ‘A4’ can be specified by………
(A) Papera4 (B) A4paper (C) Letterpaper (D) Legalpaper
(93). The page size of ‘legal can be specified by………
(A) Papera4 (B) a4paper (C) letterlegal (D) legalpaper
(94). …………can be either one-sided or two –sided.
(A) Letters (B) Files (C) Documents (D) Papers
(95). Ability of automatically laying out complex mathematical content is a major strength of …….. .
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(96). The…………. package defines several environments for mathematical content.
(A) Amsmath (B) Amssymb (C) Amsfonts (D) All of these
(97). Formulas and equations can be printed as part of the running text (inline) or they can be printed
independently on their own lines called display in………. parlance.
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(98). Formulas and equations can be printed independently on their own lines called display using the
……..environment.
(A) Math (B) Displaymath
(C) Equation (D) Mathformula
(99). A convenient way of embedding math environment in running text is to enclose the mathematical
content between…………
(A) #...#S (B) %...% (C) &…& (D) $...$
(100). LaTeX commands and the mathematical symbols are produced by them using the…………packages.
(A) MAS (B) AMS (C) MATH (D) GREEK
(101). The subscript operator in LaTeX is……. .
(A) _(the underscore character) (B) ^ ( the caret character)
(C) % (the percentage character) (D) ~ (tilde character)
(102). The superscript operator …………… the text that follows it.
(A) Raises (B) Lowers (C) Underlines (D) Strikes
(103). Absolute values can be denoted by enclosing the expression between two……… symbols.
(A) $ (dollar) (B) |(vertical bar)
(C) % (percentage) (D) “(quotes)
(104). Square root of a number X is denoted using the command…………{x}.
(A) \square (B) Squareroot (C) \sqrt (D) Sqroot
(105). …..are numbered automatically and center-aligned.
(A) Values (B) Numbers (C) Variables (D) Equations
(106). Anyone can create additional packages to enhance the features provided in……to add new features orto
provide alternate implementations.
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(107). Most of LaTeX packages are…….
(A) Charged (B) Free (C) Shareware (D) Fined
(108). CTAN website is at……….
(A) www.ctan.com (B) www.ctan.in (C) www.ctan.co.in (D) www.ctan.org
(109). LaTeX is ………… it is highly systematic and is developed in the academic spirit of knowledge sharingand
collaboration.
(A) open source (B) closed source
(C) open foundation (D) none of these
(110). LaTeX has …………. Facilities to automatically update numbering and references and to automatically
create table of contents, indexes, and other such needs, taking a major burden off the mind of the author.
(A) Integrated (B) Built-in (C) Many (D) Incorporated
(111). To use…………… there is a requirement of LaTeX distribution (software).
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(112). TeX Live is a very popular LaTex distribution software which is available in the standard ……repositories.
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(113). LaTeX can produce output in different file………….
(A) arrangements (B) formats (C) editors (D) software’s

Mahesh Sir - 9724665284 PAGE NO: 104 App : Clear Code Technical Technical
(114). LaTeX documents are typically created using any plain……… editor.
(A) text (B) transcript (C) script (D) word
(115). The different parts of the text are marked using………….. commands that associated a meaning to them.
(A) LaTeX (B) Simple (C) TeX (D) HTML
(116). ……….command is used to specify the author(s) of the document.
(A) \title (B) \author (C) \date (D) \document
(117). …………… command can be used to explicitly specify the logical structure of the document.
(A) \chapter (B) \section (C) \paragraph (D) \all of these
(118). When typing the document, one can see it as plain……….text with the built-in commands written as part
ofthe text.
(A) unformatted (B) formatted (C) in-line (D) none of these
(119). While compilation, LaTeX can also produce some additional
(A) records (B) archives (C) files (D) directories
(120). When the output file is viewed using appropriate software or print it on a printer, one can see
the………….document.
(A) unformatted (B) formatted (C) in-line (D) none of these
(121). Every time a modification is made in the…….. text, there will be a need to compile it again for seeing
theeffect of the change in the output document.
(A) source (B) basic (C) beginning (D) main
(122). LaTeX has a command called………..that produces the popular PDF format files.
(A) PDFtex (B) pdflatex (C) PDF (D) latexpdf
(123). …..files can be viewed on screen as well as printed to printers and the printout looks exactly same as
themonitor display.
(A) PDF (B) LaTeX (C) Text (D) TeX
(124). PDF documents can be viewed in………..default viewer.
(A) TeX’s (B) SciTE’s (C) LaTex’s (D) Ubuntu’s
(125). The edit-compiler-view cycle has……steps.
(A) one (B) two (C) three (D) four
(126). The LaTeX document can be compiled by issuing the command ………at the command prompt.
(A) pdflated filename(B) PDF filename (C) latexpdf filename (D) filename pdflatex
(127). The generated pdf file can also be viewed by issuing the command ………pdf filename at the
commandprompt.
(A) evince (B) latex (C) evine (D) all of the these
(128). SciTE has one advantage over……..one can compile and view the document from within the SciTEprogram
itself.
(A) evience (B) latex (C) basic (D) gedit
(129). LaTeX is essentially a …….language.
(A) markup (B) highlighted (C) object oriented (D) simple
(130). In LaTeX, some ……….. are independent commands –they do not mark any specific part of the text.
(A) instructions (B) commands
(C) guidelines (D) direction
(131). The LaTeX commands provide information about the text or the………
(A) organization (B) file (C) system (D) document
(132). The LaTeX commands directly specify …………… ,
(A) formatting (B) information (C) data (D) file name
(133). LaTeX commands start with a ….character followed by the command name.
(A) / (forward slash) (B) %(percentage) (C) \ (backslash) (D) ^ (caret)
(134). LaTeX commands are………sensitive.
(A) event (B) case (C) instance (D) example
(135). some commands accept additional information which of called………
(A) examples (B) data info (C) arguments (D) instances
(136). There are two types of…….optional and compulsory.
(A) examples (B) data info (C) arguments (D) instances

Mahesh Sir - 9724665284 PAGE NO: 105 App : Clear Code Technical Technical
(137). If one or more optional arguments are to be provided,they have to be written after the command
name,enclosed in……….
(A) [ ] square brackets) (B) “” (quotes)
(C) <> (angular brackets) (D) {} (curly brackets)
(138). Mandatory arguments (if theraereany ) have to be enclosed in in…………..
(A) [ ] square brackets) (B) “” (quotes)
(C) <> (angular brackets) (D) {} (curly brackets)
(139). 12pt is an……….. argument.
(A) name (B) optional (C) compulsory (D) all of these
(140). LaTeXtresats all ……..characters ( the space, tab and newline characters) as the same.
(A) special (B) space (C) line (D) whitespace
(141). the………at the beginning of a line are generally ignored and one of more consecutive blank lines
areconsidered to mark the beginning of a new paragraph.
(A) special (B) space (C) line (D) whitespace
(142). …………..is called the line break command..
(A) \\ (B) || (C) // (D) !!
(143). Which of the following is a reserved character in LaTeX ?
(A) # (B) $ (C) % (D) All of these
(144). LaTeX, uses………..to mark oprtions of text.
(A) clusters (B) groups (C) sets (D) collections
(145). Any………..in a group applies only to text following the command within that group.
(A) instruction (B) command (C) guideline (D) direction
(146). For the cases when a multitude of commands must be applied (for example, for foramtiign a table
ofmathematical equation properly) or where some command(s) have to be applied to large portions of the
text(like several paragraphs, whoel section), LaTeX provides a facility called………
(A) grouping (B) printing
(C) environments (D) sections
(147). All the formatting characteristics of the…….. are applied to the entire text inside the environment.
(A) area (B) extent (C) environment (D) section
(148). LaTeX has several advanced features, including …..and automatically generating parts of the documents
ormultiple documents (mall marge).
(A) programming (B) designing (C) planning (D) all of these
(149). ………….are meant for the humans who read the LaTeX source code in a text editor for understanding
andmodifying it.
(A) Comments (B) Notes (C) Explanations (D) Remarks
(150). A LaTex document has…….parts namely preamble and content.
(A) one (B) two (C) three (D) four
(151). The…….is information about the document and instructions on two Latex should process the document.
(A) actual content (B) information (C) preamble (D) metadata
(152). The very first element in the……must be \documetclass {document –class-name} specifying the type ofthe
document.
(A) main content (B) information (C) preamble (D) remarks
(153). option “book” In document class is used for writing entire……….
(A) articles (B) books (C) slides (D) letters
(154). option “letter” In document class is used for writing……….
(A) articles (B) books (C) slides (D) letters
(155). …………..points is the default font size in the document.
(A) 12 (B) 11 (C) 10 (D) 14
(156). With option……….. displayed formulas and equations are flushed left( left-aligned).
(A) fleq (B) fleqn (C) formula (D) forleft
(157). the……… option changes the layout of the document to print in landscape mode.
(A) portrait (B) landscape (C) vertical (D) horizontal
(158). LaTeX allows users to write……that provide additional functionality.
(A) classes (B) packages (C) variables (D) formulas

Mahesh Sir - 9724665284 PAGE NO: 106 App : Clear Code Technical Technical
(159). LaTeX distributions themselves usually come with a large number of preinstalled.
(A) classes (B) packages (C) variables (D) formulas
(160). If the user is not using options for any packages, multiple packages command, separated by…………
(A) (:) colon (B) (,) comma (C) (;) semi colon (D) (^) caret
(161). …….. package adds support for colored text.
(A) easylist (B) listing (C) setspace (D) color
(162). ………package is used for page layout tasks
(A) geometry (B) easylist (C) setspace (D) scolor
(163). ………..package helps in changing line spacing.
(A) Geometry (B) Listings (C) Setspace (D) Easylist
(164). Providing data is……….. if is omitted then the date of compilation is used in the title.
(A) by choice (B) optional (C) compulsory (D) important
(165). The document environments for articles and slides will only have a title followed by the ……of the
document.
(A) Main content (B) Information (C) Preamble (D) Remarks
(166). The \title, author and \date commands must precede the……….command because their information isused in
creating the title.
(A) \title (B) \maketitle (C) \marktitle (D) \spotitle
(167). The document environment of a book ……… main parts.
(A) The front matter (B) The main matter (C) The back matter (D) All of these
(168). The parts are divided into………
(A) Chapters (B) Sections (C) Parts (D) Subsections
(169). The sections are divided into……….
(A) Chapters (B) Sections (C) Parts (D) Subsections
(170). The sub subsections are divided into……….
(A) Chapters (B) Sections (C) Parts (D) Subsections
(171). Each of the above division (of the main content) ………..one compulsory argument, the title; and oneoptional
argument.
(A) Accepts (B) Acknowledges (C) Receives (D) Agrees
(172). The 7…….. next inside one another and have an integer level assigned to them, with part having a levelof 1,
chapter a level of 0, section a level of 1 and so on.
(A) Lists (B) Details (C) Contents (D) Elements
(173). The ….can also move chapters, sections and subsections without having to bother about remembering.
(A) Programmer (B) Author (C) Writer (D) Essayist
(174). The chapters, sections, subsections, etc. are ……..in Arabic numerals(1,2,3, and so on).
(A) Numbered (B) Listed (C) Displayed (D) Edited
(175). The…….. command is to be used only once.
(A) \parts (B) \list (C) \appendices (D) \appendix
(176). The pages in the main matter and back matter are numbered in………..numerals with the numbering
restarting from 1.
(A) Roman (B) Mathematical (C) Decimal (D) Arabic
(177). ……….and further divided are not assigned numbers.
(A) Chapters (B) Paragraphs (C) Parts (D) Sub subsections
(178). Elements are assigned a number formed by appending a period (.)
(A) Period (.) (B) Colon (:) (C) Semi colon (;) (D) Hash (-)
(179). ……..are assigned simple Arabic numeral numbers.
(A) Chapters (B) Sections (C) Parts (D) Subsections
(180). By default a….. has entries up to level 2 (subsection )>
(A) \TOC (B) \tableofcontents (C) \tableOC (D) \toContents
(181). LaTeX produces the output file…………
(A) Randomly (B) In line (C) Sequentially (D) Cautiously
(182). In the first run LaTeX collects information about the document structure and stores it in…….files.
(A) Extra (B) Complementary (C) Additional (D) Supplementary

Mahesh Sir - 9724665284 PAGE NO: 107 App : Clear Code Technical Technical
(183). Just like the ………latex can also maintain list of figures, list of tables, cross references, bibliography,and
glossary or index automatically.
(A) TOC (B) Tableofcontent (C) Table (D) Content
(184). In the SciTE editor, the file can be compiled using…….. menu option.
(A) Tools-Go (B)File-Go (C) Tools – Compile (D) File-Compile
(185). In the SciTE editor, the last line “Exit code: 0” is ………in color.
(A) Yellow (B) Black (C) Red (D) Blue
(186). In the SciTE editor, the shortcut key for viewing in the default document is……..
(A) F8 (B) F4 (C) F7 (D) F5
(187). Latex usually avoids breaking a word in…. parts.
(A) One (B) Two (C) Three (D) Four
(188). LaTeX uses the…….character to denote a non-breaking space.
(A) Hyphen (-) (B) Tilde (~) (C) Underscore (_) (D) Colon (:)
(189). …………(also called serif) font have a tiny line or curve called serif at the end of the strokes (lines).
(A) Roman (B) Monospace (C) Script (D) Sans serif
(190). …………….fonts use equal width for all characters.
(A) Roman (B) Monospace (C) Script (D) Sans serif
(191). The default font is………..
(A) Roman (B) Monospace (C) Script (D) Sans serif
(192). Sans serif font can be used for any text by employing the…… command.
(A) \textrm{tex} (B) \textf{text} (C) \texttt{text} (D) None of these
(193). The font size can be changed using the command………
(A) \tiny (B) \scriptsize (C) \footnotesize (D) All of th
(194). The font size can be changed using the command….....
(A) \LARGE (B) \huge (C) \Huge (D) All of these
(195). The command ……can be sued to add the italic effect to the text.
(A) \textbf (B) \textit (C) \emph (D) All of these
(196). ………..command provides small capital letters.
(A) \textbf (B) \textit (C) \emph (D) All of these
(197). In LaTeX, the ……….package provides the singlespace, onehalfspace, doublespace and spacing
{amount-of-spacing} environments for setting the line spacing.
(A) \textsuperscript (B) \textsubscript (C) Fixltx2e (D) None of these
(198). In latex, the …….package provides the singlespace, onehelfspace, doublespace and sapcing {amountof-
spacing } environments for setting the line spacing.
(A) spaceset (B) setspace (C) spaceout (D) spaceline
(199). To achieve right alignment, one has to use the environment….
(A) Flushleft (B) Flushright (C) Center (D) Justify
(200). To achieve center alignment, one has to use the environment………
(A) flushleft (B) flushright (C) center (D) justify
(201). the……. command is used immediately before a paragraph to explicitly make the first lien indented.
(A) \tab (B) \para (C) \indent (D) \noindent
(202). The……. environment outputs everything inside it (including special characters, spaces, newlines andLaTeX
commands) as it is without any processing.
(A) verbatim (B) moreverb (C) listing (D) newline
(203). The paper size and margins can be passed as optional arguments with the…..command itself.
(A) \moreverb (B) Verbatim (C) \usepackage (D) \usesize
(204). The page……commonly used with regular printers are A4, letter and legal.
(A) Sizes (B) Length (C) Width (D) Dimension
(205). The pages of ‘letter’ can be specified by…….
(A) Papera4 (B) a4paper (C) letterlegal (D) legalpaper
(206). The default page orientation is the………
(A) Landscape (B) Portrait (C) A4 (D) Legal
(207). …….are by default one-sided while books are two-sided.
(A) Articles (B) Files (C) Documents (D) Papers

Mahesh Sir - 9724665284 PAGE NO: 108 App : Clear Code Technical Technical
(208). The most common way of laying out mathematical content in LaTeX is using the package ………….
created by the American mathmetical Society.
(A) Amsmath (B) Amssymb
(C) Amsfonts (D) All of these
(209). There are……..ways of typesetting formulas and equations.
(A) One (B) Two (C) Three (D) Four
(210). Formulas and equations can be printed as part of the running text (inline) using the………..
(A) Math (B) Displaymath
(C) Equation (D) Mathformula
(211). The ………environment is a display environment that automatically numbers equations.
(A) Math (B) Displaymath
(C) Equation (D) Mathformula
(212). In mathematical environments, each letter is treated as a mathematical……………
(A) value (B) number
(C) variable (D) equation
(213). LATeX supports a large number of mathematical ………….. .
(A) operators (B) formulas
(C) signs (D) text
(214). The superscript operator in LaTeX is the………..
(A) _(the underscore character) (B) ^ ( the caret character)
(C) % (the percentage character) (D) ~ (tilde character
(215). The subscript operator ……..lowers the text that follows it.
(A) Raises (B) Lowers
(C) Underlines (D) Strikes
(216). Fractions are created using the command ……….. {numerator} {denominator).
(A) Fraction (B) Fractions (C) Frcs (D) \frac
(217). LaTeX provides a special ……..environment for typesetting equations.
(A) math (B) displaymath
(C) equation (D) mathformula
(218). Just as………… was extended to LaTex, LaTeX itself also can be extended.
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(219). Thousands of LaTeX ………have been created by LaTeX users around the world to cater to differentneeds.
(A) Packages (B) Softwares
(C) Programs (D) Files
(220). The latex package are hosted on the…….
(A) Comparative Tax Archive network (CTAN)
(B) Comprehensive tex archive network (CTAN)
(C) Complete TeX archive network (CTAN)
(D) Comprehensive TeX archive net (CTAN
(221). ….is quite popular among authors and publishers in mathematics, engineering computer science andother
technical areas.
(A) TeX (B) SciTE (C) LaTeX (D) Ubuntu
(222). …….is also getting popular among academicians and scholars.
(A) TeX (B)SciTE (C) LaTeX (D) Ubuntu
(223). The output of \csc^2\theta -\cot^2\theta=1 is ….. .
(A) Sin2 + cos2 = 1 (B) Sec2 + tan2 = 1 (C) Sec2 + cot2 = 1 (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 109 App : Clear Code Technical Technical
Other Useful Free Tools And Services
Total Marks: 5
(1). How one needs to transfer files or an entire directory ?
(A) From one computer to another (B) From computer to storage device
(C)a and b both (D) None of these
(2). Which parts of computer are not as fast as internal components of a computer ?
(A) Computer network (B) External storage devices (C) a and b both (D) none of these
(3). Computer scientists have developed techniques to place a whole directory structure into a single file or for
convenience. Such a file is known as _________.
(A)archive (B) archive file (C)arvice file (D)arsive file
(4). By using data compression technique, what can be done in the data storage place of memory and disk ?
(A)increment (B) Reduction (C) Transfer (D) Repetition
(5). Which technique identify and eliminate less important information to conserve space ?
(A) Data compressio (B) Data repetition
(C) Data extension (D) Data conservation
(6). Where in the encoded file, one can have the data that tells which digit/letter represents which word ?
(A) Beginning (B) Middle (C) Ending (D) None of these
(7). In the encoded file, how many time lengthy words appear ?
(A) Not a single time (B) One (C) Infinite (D)As specified
(8). In the encoded file, which symbol is marked in the beginning ?
(A) ^ (B)& (C) $ (D) %
(9). In the encoded file, by using which process it can be transformed into original file at any time ?
(A) Straight (B) Reverse (C) Transfer (D) Compressed
(10). From the following, which file describes the entire directory structure in it ?
(A) Archive (B)Arcive (C)Archip (D)Arcrip
(11). Which software is provided by Linux for managing archive files ?
(A) Archive manager (B) Archive master
(C) Archive assistance (D) Archive viewer
(12). Which is the common archive Structure of Linux ?
(A) TER (B) TAR (C) TET (D) TAT
(13). Which facility does TAR provide ?
(A) Archive compression (B) Reducing size of file
(C)(A) and (B) (D) None of these
(14). From the following, which is the most common file structure format?
(A)zip (B) tar.gz (C) jpeg (D)(A) and (B) both
(15). From the following, where the archive type password options are available ?
(A)zip (B) tar.gz (C)(A) and (B) both (D) None of these
(16). By using which program, an uncompressed file in the tar format is compressed to the zip format
(A)gzip (B)gunzip (C)gtar (D)guntar
(17). What is full form of gzip ?
(A) GNU zip (B) GUN zip (C) GNA zip (D) GNE zip
(18). The tar.gz file is also known as _______.
(A) Tat ball (B) Tar ball (C)Tet ball (D)Tak ball
(19). For which process, Archive manager uses extension part ?
(A) For creating new archive file (B) To open an Archive file
(C) To select the file format (D) All of these
(20). From the following, which option shows the use of Archive Manager ?
(A) To explore the contents of archives
(B) To extract files from the archives
(C) To add new files to the archive and delete files to the archive and delete
(D) All of these

Mahesh Sir - 9724665284 PAGE NO: 110 App : Clear Code Technical Technical
(21). What is done on archive file available in the file browser to start the Archive Manager ?
(A) Click (B) Double –Click (C) Right – click (D) Drag and drop
(22). Which extension can be given to create an Archive file ?
(A) .ar, .cbz, .jar (B) .tar, .tar.bz2, tar.gz, tar.zma
(C) .zip (D) Anyone
(23). What is done firstly, to create a compressed and archive file into uncompressed ?
(A) Left clicking a file -> Open with archive manager
(B) Right clicking a file -> open with archive manager
(C) Left clicking a file -> open with Winzip
(D) Right clicking a file -> open with winzip
(24). Which button can be used in the Archive Manager toolbar, to go to the parent directory ?
(A) Back Button (B)Up button (C) Home button (D) Open button
(25). From the following, for which process Archive manager is useful ?
(A)using archive files for back-up (B) For transfer via external storage device
(C) For transfer via network (D) All of these
(26). VLC is which type of media player ?
(A)proprietary (B) Open –source (C) a and b both (D) None of these
(27). From the following, in which city VLC is started as an academic project by the music loving students of a
university ?
(A) new York (B)paris (C) Berlin (D) Delhi
(28). From the following, which option shows an issue faced with multimedia contents ?
(A) Converting multimedia information coming from hardware devices into computer data
(B)converting the computer data back into audio/video streams for playing on the hardware device
(C)a and b both
(D) None of these
(29). In the multimedia contents, which process is done by a software ?
(A) Conversion (coding) (B) Reverse conversion
(C) (A) and (B) both (D) None of these
(30). What is full form of codec ?
(A)code Decode (B) Codec Decodec
(C) Coding Decoding (D) coder Decorder
(31). What is the advantage of VLC ?
(A) It support all the popular codecs and all the popular formats
(B) It support all the limited codec and all the popular formats
(C)it support all the popular web-servers and all the popular formats
(D)It supports all the limited web – servers and all the popular formats
(32). To start VLC, which option is used ?
(A) Application -> VLC media player
(B) Application -> sound -> VLC media player
(C) Application -> Accessories -> VLC media player
(D) Application -> sound and video -> VLC media player
(33). If one or more files are opened in VLC media player, then they are added to what ?
(A) Directory playlist (B) Master playlist (C) File playlist (D) Media playlist
(34). How one can play the media in the playlist in the VLC media player ?
(A) In sequence (B) In random order (C)(A) and (B) both (D) None of these
(35). In VLC media player, to open the saved playlist which menu option is used ?
(A) Media -> Open file (B) Media -> open Directory
(C) View -> playlist (D) open -> playlist
(36). What is the full form of M3U ?
(A) MPEG user sound reference file (B) MPEG Universal Sound reference file
(C) MPEG unified sound reference file (D) MPEG URL sound reference file
(37). In VLC media player, what one can do by sliding the little slider on the progress bar ?
(A) Move forth in current track (B) Move back in current track player
(C) Move to next track (D)(A) and (B) both

Mahesh Sir - 9724665284 PAGE NO: 111 App : Clear Code Technical Technical
(38). VLC media player, while watching the video in fullscreen which control is hidden ?
(A)play (B) Pause (C) Stop (D) All of these
(39). In VLC media player, which options are available in menu ?
(A) play, Pause (B) Previous, Stop, Next
(C)Fullscreen , playlist, Settings (D) All of these
(40). In VLC media player, which menu option is used to convert multimedia files from one format to another ?
(A) Media ->conver / save (B) File ->conver / save
(C) Edit ->conver / save (D) Format ->conver / save
(41). Google maps is which type of service ?
(A) Free (B) Paid (C) Sometimes free (D) Sometimes paid
(42). What does Google maps allow anybody ?
(A) To edit the maps (B) To identify landmark, buildings, etc..
(C) To upload photographs of the place (D) All of these
(43). Google maps service can be accessed on which website ?
(A)https://www.google.co.in (B)http://maps.google.co.in
(C)(A) and (B) both (D) none of these
(44). How Google maps service can be accessed on mobile ?
(A) Mobile phone’s web browser (B) From the google maps application
(C)(A) and (B) both (D) None of these
(45). In Google maps, how the idea of the user’s location can be obtained ?
(A) From the user’s mobile place (B) From the user’s previous place
(C) From the user’s current place (D)From the user’s internet connection
(46). What is the full form of GPS ?
(A) Gallery positioning system (B) Geographical Positioning System
(C) Global Positioning System (D) Guide Positioning System
(47). What is allowed in Google maps?
(A) To take-away the map (B) To bring the map
(C) To drag it in different direction (D) All of these
(48). Google maps show the information of a place in which form?
(A) Map view (B) Satellite view (C)(A) and (B) both (D) None of these
(49). What is the default view of Google maps?
(A) Map view (B) Satellite view (C)(A) and (B) both (D) None of these
(50). In Satellite view, images are taken captured through ________.
(A) Satellite in the web-server (B) satellite in the sky
(C) satellite in the Google-server (D) internet
(51). Google maps provide which facility to reach any particular place?
(A) Choice of form (B) Choice of routes
(C) Choice of thing (D) Choice of satellite
(52). By using which device in Google maps, it provides turn-by-turn guidance?
(A) Mobile phone equipped with GPRS receiver (B) Mobile phone equipped with Wi-Fi receiver
(C) Mobile phone equipped with GPS receiver (D) Mobile phone equipped with GSM receiver
(53). Which program is used to enter Unicode characters into any application?
(A) Character Map (B) Font Map (C) Unicode Map (D) ASCII Map
(54). Which option can be used to start character Map?
(A) Application -> Character map (B) Application -> Accessories -> Character map
(C) Application -> Office -> Character map (D) Application -> Graphics -> Character map
(55). What is done on any character to select it in the character map?
(A) Click (B) Double-Click (C) Right-Click (D) Drag and Drop
(56). Where the details of the character are selected and entered shown in the character map?
(A) Title Line (B) Menu Line (C) Document Line (D) Status Line
(57). From the following, which tab is seen in the character map ?
(A) Character table (B) character details (C)(A) and (B) both (D) None of these
(58). Which tab of the character map shows more details and features of the character ?
(A) Character table (B) Character details (C)(A) and (B) both (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 112 App : Clear Code Technical Technical
(59). Which is a good solution if one has to type a few characters in another script occasionally?
(A) Archive manager (B) Google maps
(C) Character map (D) R software
(60). ‘R’ software is which type of software?
(A) Free for statistical computing (B) Free for word processing
(C) Free for spreadsheet (D) Free for publishing
(61). What is the full form of GNU?
(A) GNU’s Now Unix (B) GNU’s Not Unit (C) GNU’s New Unix (D) GNU’s Name Unix
(62). ‘R’ software has _______ as its own language.
(A) Web (B) source (C) scripting (D) section
(63). From the following, which option shows the work environments of ‘R’ software?
(A) Command line (B) Graphics (C)(A) and (B) both (D) None of these
(64). What is full form of GUI ?
(A) Graphical Used Interface (B) Graphical Useful Interface
(C) Graphical Universal Interface (D) Graphical User interface
(65). Which command can be used to start the ‘R’ software in terminal ?
(A)R  (B) r  (C)rsof (D)Rsof
(66). Which mark is used to write the comment in ‘R’ software ?
(A) % (B) # (C) $ (D)&
(67). In ‘R’ software, any text following # upto the end of the line is known by which name ?
(A) Master line (B) Secondary line (C) Variable line (D) Comment line
(68). From the following, which option shows the data type in ‘ R’ software ?
(A) Number (B) String (C)(A) and (B) both (D) symbol
(69). What is available in ‘R’ software just like other programming languages ?
(A) Common operators (B) Functions
(C)(A) and (B) both (D) syntax
(70). In ‘R’ software, ordered lists/arrays/lists of items are referred to as what ?
(A) Vector (B) Variables (C) Sectors (D) Bitmap
(71). In ‘R’ software, the C function combines several numbers into what ?
(A) Symbol (B) List (C) Workspace (D) Browser
(72). Which command is used for online help in ‘R’ software ?
(A)onlinehelp (B) guide() (C) help() (D)help.start()
(73). Which command is used to get help on a particular function ?
(A)help(function name) (B) guide(function name)
(C)onlinehelp(function name) (D)help.start(function name)
(74). Which function is used to display a list of all the variables define in ‘R’ software ?
(A)list() (B) Is() (C)var() (D) file()
(75). By using which syntax a series of consecutive numbers may be generated in ‘R’ software ?
(A)secondary number: secondary number (B) secondary number : secondary number
(C)Starting number : ending number (D) Ending number : starting number
(76). In ‘R’ software, which symbol shows the prompt ?
(A)> (B)& (C) $ (D) %
(77). Which option can be used to display a variable ‘a’ with the assign value in ‘R’ software ?
(A)a ()  (B) a  (C) run a  (D) display a 
(78). In ‘R’ software, which command is used to find the minimum value ?
(A)Min(list1,list2) (B) Minimum(list1, list2) (C) Min(list) (D) Minimum(list)
(79). In ‘R’ software, which command is used to find the mean ?
(A)Mean(list) (B) Median(list) (C) Mean(list1, list2) (D) Median(list1,list2)
(80). In ‘R’ software, which option specifies the data list type of argument while creating a graph ?
(A)no student ? (76, 89, 56) (B)barplot(no_student)
(C)ylab=”students”, name,arg=faculty_name (D)ylim=c(0, 1000), border=”blue”
(81). In ‘R’ software, which argument specifies the Y-axis ?
(A)y.arg (B)ylab (C)ylim (D) y-axies
(82). In ‘R’ software, which argument specifies the range of values on the Y-axis ?

Mahesh Sir - 9724665284 PAGE NO: 113 App : Clear Code Technical Technical
(A)yname (B)yarg (C)ylim (D)ylab
(83). In ‘R’ software for long commands when enter is pressed before the command completes then which prompt
is issued until the command completed ?
(A) + (B) ^ (C)& (D) @
(84). In ‘R’ software, which command is used to create the histogram ?
(A) Hits (B)Histo (C)Hist (D) Histogram
(85). Which constraint is there for the people working on different projects in areas like construction, engineering,
consulting etc ?
(A) Time (B) Budget (C) Resource (D) All of these
(86). From the following, which open source software helps the project managers in preparing and maintaining a
project plan ?
(A)RationalPlan (B) Archive Manager (C) Skype (D) ‘R’ software
(87). How many desktop products are included in RationalPlansoftware ?
(A)two (B) Three (C) Four (D) Five
(88). RationalPlan software can be downloaded from which website ?
(A)www.rationalplan.org (B) www.rationalplan.co.in
(C)www.rationalplan.com (D) www.rationalplan.edu
(89). RationalPlan software does not support to which version of Ubuntu ?
(A) 10.04 (B) 12.04 (C) 13.04 (D) 14.04
(90). In RationalPlan software, which desktop product allows to manage independent projects ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan project viewer (D) All of these
(91). In In RationalPlan software, which desktop product does not have common resources and no interrelation
between different projects ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan multi project (D) All of these
(92). In RationalPlan software, which desktop allows the manager to associate which general project information ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan multi viewer (D) All of these
(93). In RationalPlan single, once the resources are created then what the user can assign/allot ?
(A) Information (B) Tasks (C) Reports (D) Data
(94). Which type of report can be generated with the help of RationalPlansingle ?
(A) Data can be imported from other project management tool
(B) Data can be exported into other formats
(C)(A) and (B) both
(D)None of these
(95). In RationalPlan software, which dektop product allows to manages interdependencies between projects ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan multi viewer (D) All of these
(96). Which desktop product of RationalPlan software, calculates the resources data i.e work, cost and over
allocation considering their assignments in all projects ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan multi viewer (D) All of these
(97). The original file of RationalPlan possess which type of format
(A) .xpr (B) .xrp (C) .xqr (D) .xrq
(98). In RationalPlan software, which dektop product can be used to open Microsoft project files?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan project viewer (D) All of these
(99). The users use which services for messaging ?
(A) yahoo messenger (B)GoogleTalk (C)RediffBol (D) All of these
(100). During chatting which facility can be used ?
(A) Text (B) Video (C) Audio (D) All of these
(101). How the skype allows its users to communicate ?
(A)text (B) voice (C) video (D) all of these

Mahesh Sir - 9724665284 PAGE NO: 114 App : Clear Code Technical Technical
(102). How the calls can be done within the skype ?
(A) Free of charge (B) with charge (C) with nominal charge (D) none of them
(103). How skype software can be downloaded ?
(A) Free of charge (B) With charge (C) With nominal charge (D) none of them
(104). No modification can be done in skype’s source code. Choose the correct option for this statement.
(A)its true (B) its false (C) Can’t say (D) None of these
(105). From the following, in which there is inbuilt facility to use skype service?
(A) Laptop (B) Modern computers (C)(A) and (B) both (D) None of these
(106). Which option can be chosen to start Skype ?
(A) Application -> Skype (B) Application ->Internet-> Skype
(C) Application -> Accessories-> Skype (D) Application -> Media -> Skype
(107). To use Skype once the account is created click on “sign in” button and then which information is to be
entered ?
(A) Skype name (B) Password (C)(A) and (B) both (D) None of these
(108). From the following, which file format stores the multiple files in a single Zip file ?
(A) Zap (B)zip (C)zop (D)zep
(109). Which is very common format for distributing software or bundles of files on the Linux platform?
(A) Tat ball (B)Tar ball (C)Tet ball (D)Tak ball
(110). Which type of multimedia player is available in ubuntu?
(A) VCL Media player (B)VLC media player (C)VLS media player (D)VSL media player
(111). Google maps provide which type of facility?
(A)To search any particular place
(B)To get any direction for particular place
(C)To get directions to reach from one place to another
(D) all of these
(112). In RationalPlan software, which desktop product does not have common resources and no interrelation
between different projects?
(A)RationalPlan single object (B)RationalPlan multi project
(C)RationalPlan Project viewer (D) All of these
(113). What is full form of tar.
(A)tapearchiver (B)tech archiver (C)test archiver (D)tight archiver
(114). What is included in computer files ?
(A) Data (B) Program (C) (A) and (B) both (D) None of these
(115). Which thing becomes a concern, when one wants to transfer files to another computer or storage device ?
(A) The amount of data to be transferred (B) The form of data to be transferred
(C) Time of data to be transferred (D) Use of data to be transferred
(116). Why do the amount of data to be transferred become an issue, if the files and directories are transferred to a
storage file ?
(A) Due to finit capacity of storage device (B) Due to multiple uses
(C) a and b both (D) none of these
(117). The techniques for reducing the storage requirement of computer files and directory structure are known by
which name ?
(A) Data compression (B) Data storage place (C) Data form (D) Data transfer
(118). What process is done by the data compression while encoding the data ?
(A) Identifying repetition in the data (B) Reducing repetition in the data
(C) Eliminating repetition in the data (D) All of these
(119). In data compression technique, each word is represented by what ?
(A) Digit (B) Letter (C) a or b (D) Picture
(120). What is the reason that in the beginning of encoded file there is data telling which digit/letter represents
which word ?
(A) It is needed to convert the file in compression form
(B) it is needed to convert the file in encoded form
(C)it is needed to convert the file in its original uncompressed form
(D)it is needed to convert the file in graphical form

Mahesh Sir - 9724665284 PAGE NO: 115 App : Clear Code Technical Technical
(121). In the encoded file, which type of changes are made in sysmbols ?
(A) They are compressed (B) They are changed to a letter or symbol
(C) They are represented in the graphical form (D) No changes are made
(122). In the encoded file, which symbol is marked in the ending ?
(A) ^ (B)& (C) $ (D) %
(123). What is known as to combine many files or an entire directory tree into single file ?
(A) Archive (B) File storage (C)(A) or (B) (D) Data transfer
(124). Which type of software Linux provides for managing archive files ?
(A) Free (B) Open-source (C)(A) and (B) both (D) None of these
(125). From the following for which process ‘Archive Manager tool ‘ is used ?
(A) For transferring the data of file and directory (B) For place compression on the file and directory
(C) For altering the form of file and directory (D)For data compression on file and directory
(126). What is the full form of TAR ?
(A) Tape Archiver (B) Take Archiver (C) Take Archivers (D) Top Archiver
(127). To whom does TAR give Confirmation ?
(A) More than one compressed algorithm (B) Compressed file structure
(C)(A) and (B) both (D) None of these
(128). From the following, which file format stores multiple files in a single Zip file ?
(A)zap (B) zip (C)zop (D)zep
(129). From the following, in which system the common practice is to combine the files into a single uncompressed
file in the files into a single uncompressed file in the tar format ?
(A) Unix (B) Linux (C)(A) and (B) both (D) None of these
(130). Using gzip program an uncompressed file in the tar format is compressed in the zip format, by providing
which extension ?
(A)tar (B) tar.gz (C) tar.gz (D) zip
(131). From the following which is the open-source Archive program ?
(A)win zip (B)gzip (C)(A) and (B) (D) none of these
(132). Which file in java uses zip compression?
(A) JAR (B) JER (C) ZAR (D) ZER
(133). From the following which option shows the use of Archive Manager ?
(A) To explore the contents of archives (B) To extract files
(134). Which menu-option is used to start Archive Manager ?
(A) Application -> Archive manager (B) Application ->Accessories – Archive manager
(C) No menu -> option available for it (D)None of these
(135). What is done to create a new archive file ?
(A) Right clicking a file -> Compress (B) Left clicking a file -> Compress
(C) Right clicking a file -> Archive (D) Left clicking a file -> Archive
(136). From the following, what are archived ?
(A) File contents (B) Directory contents (C) a and b both (D) None of these
(137). When an archive is open in the Archive Manager, then how it is seen ?
(A) File Browser (B) File window (C) File explorer (D) File document
(138). Which button can be used in the Archive manager toolbar, to create a compressed file into uncompressed ?
(A) Open button (B) Home button (C) Extract (D) Up button
(139). What is the full form of VLC ?
(A)VideoLan Client (B)VideoLocal Client (C)VideoLocation Client (D)VideoLayer Client
(140). Due to which reasons VLC media player is popular ?
(A) Features (B) Versatility (C)(A) and (B) both (D) none of these
(141). Recently VLC is available in which operating system for common public ?
(A) Windows (B) Linux (C) Mac operating system (D) all of these
(142). To convert multimedia information coming from hardware devices into computer data can be compared with
which process ?
(A)coding (B) Decoding (C)(A) and (B) both (D) None of these
(143). In the multimedia contents, coding and decoding is performed by a software component known as _______.
(A)codec (B)modec (C)sodec (D)bodec

Mahesh Sir - 9724665284 PAGE NO: 116 App : Clear Code Technical Technical
(144). What does each multimedia data format require ?
(A)player (B) Codec (C) Network (D) Prototype
(145). VLC supports which devices ?
(A) Web cameras (B) HD monitors
(C) Speakers, microphones, headphones (D) All of these
(146). When any directory is opened in VLC media player, then VLC actually opens which files in that directory ?
(A) All media files that can be played (B) All media files that cannot be played
(C) All files available in directory (D) All of these
(147). The list of playing media file is known as ________.
(A)medialist (B) playlist (C)masterlist (D)filelist
(148). In VLC media player, to save the playlist which menu option is used ?
(A) Media ->Save file (B) Media -> save directory
(C) View -> save playlist (D) Media -> save playlist to file
(149). In VLC media player, which format is the most common format ?
(A) M3U (B) MPEG (C) WAV (D) DATA
(150). Which bar is displayed at the bottom of the Window in VLC media player ?
(A) Media bar (B) Progress bar (C) player bar (D) Window bar
(151). In VLC media player, which button is used to display the playlist ?
(A) (B) (C) (D)
(152). VLC media player, which button is used for additional settings ?
(A) (B) (C) (D)
(153). In VLC media player, is known by which name ?
(A)show playlist (B) Show extended setting (C) Previous media (D) show settings
(154). Google maps service is provided by whom ?
(A) Google corporation (B) Google incorporation
(C) Google outcorporation (D) Google newcormporation
(155). Through which means Google has over a period of years, collected extensive map data for the whole earth ?
(A) Satellite imagery (B) Cars with cameras mounted on them
(C) Data purchased from other organization (D) All of these
(156). In which media, Google maps service is popular ?
(A) Mobile devices (B) Smartphones (C) Tablets (D) All of these
(157). In how many ways, Google maps service can be accessed on mobile ?
(A)two (B) three (C) four (D) five
(158). When Google maps service is started, what the service first tries to know ?
(A) The user has been log in or not (B) The current location of the user
(C) The near areas location of the user (D) The device used by the user
(159). By which facility on a mobile phone, the user’s location can be achived with very high accuracy ?
(A) GPS (B) GSP (C) GPRS (D) Bluetooth
(160). By using ______, in mobile phone and GPS system, the user’s location with an estimated error of only few
meters can be finding.
(A) Mobile signals (B) satellite signals (C) web – server signals (D) device signals
(161). Google maps show the information of a place in how many forms?
(A) Two (B) Three (C) Four (D) Five
(162). Google maps form can be changed by clicking Satellite / Map image on which part?
(A) At bottom on right – hand side (B) At top on right-hand side
(C) At bottom on left-hand side (D) at top on left-hand side
(163). By satellite view of Google maps, the view can be changed into which image?
(A) Common (B) Photograph (C) Satellite (D) Map
(164). By which view of Google maps, the images are clear enough to identify most familiar buildings and roads?
(A) Map view (B) Satellite view (C)(A) and (B) both (D) None of these
(165). Google maps avail which option to reach any particular place?
(A) Get Direction (B) Suggested routes (C) Current traffic (D) All of these
(166). In Google maps service to reach any particular place, how it provides the instruction to its user ?
(A) On-screen (B) Spoken (Voice) (C)(A) and (B) both (D) None of these

Mahesh Sir - 9724665284 PAGE NO: 117 App : Clear Code Technical Technical
(167). The character map is mainly used to enter which code?
(A) ASCII (B) ANSI (C) Unicode (D) Binary
(168). Brief Details of which characters are shown in the status line of the character map?
(A) Character selected with single – click (B) Character entered with double – Click
(C)(A) and (B) both (D) None of these
(169). What is done on any character to enter it in the character map?
(A) Click (B) Double-Click (C) Right-Click (D) Drag and Drop
(170). How many types of tab are seen in the character map ?
(A) Two (B) Three (C) Four (D) Five
(171). Which tab of the character map shows the table of various characters ?
(A) Character table (B) Character details (C)(A) and (B) both (D) None of these
(172). In the character map, how after getting a substantial amount of content, it can be included into an
application ?
(A) Copy and paste (B) Cut and paste (C) Copy and move (D) Cut and move
(173). In the character map after including the appropriate content, it can be copied by clicking which button?
(A)copy (B) Cut (C) store (D) Select
(174). ‘R’ software is a ______ project.
(A) GUN (B) GLU (C) GNU (D) GMU
(175). From the following, ‘R’ software is used for which analysis?
(A) Written (B) Graphic (C) Verbal (D) Statistical
(176). How many types of work environments have ‘R’ software?
(A) Two (B) Three (C) Four (D) Five
(177). What is the full form of CLI ?
(A) Command Lane Interface (B) Command Line Interface
(C) Command Leave interface (D) Command Length interface
(178). From the following, which option shows the graphical editors of ‘R’ software ?
(A) ‘R’ Commander (B) ‘R’ studio (C)(A) and (B) both (D) ‘R’ Media
(179). What is displayed as soon as ‘R’ software begins ?
(A) Comment message (B) Compilation message
(C) Command message (D) Welcome message
(180). Just like what, ‘R’ software uses # as the comment marker ?
(A) Linux shell (B) Writer in openoffice (C) C language program (D)Geditwordprocessor
(181). How many data types are there in ‘R’ software ?
(A) Two (B) Three (C) Four (D) Five
(182). In ‘R’ software, string is enclosed in what ?
(A) In single quotes (B) In double quotes (C)(A) and (B) both (D) # symbol
(183). In ‘R’ software, what is commonly used of items ?
(A) Ordered lists (B) Arrays (C) Lists (D) All of these
(184). In ‘R’ software, which function is used to create lists ?
(A) HTML (B) Visual Basic (C) C (D) R
(185). In ‘R’ software, which operators work eually well on single number as well as on lists ?
(A) + and - (B) * (C) / (D) All of these
(186). Which command is used to open the online help in a browser ?
(A)onlinehelp () (B) guide() (C) help() (D)help.start()
(187). Which command is used to view some demonstration in ‘R’ software ?
(A)video() (B) view() (C) demo() (D) display()
(188). Which shortcut key is used to clear the screen in ‘R’ software ?
(A) Ctrl + s (B) Ctrl + D (C) Ctrl + C (D) Ctrl + L
(189). In ‘R’ software, the method of generating series of range 1 : 5 is same as what ?
(A)c(1………5) (B) c(1, 2, 3, 4, 5) (C) c(1……………5) (D) c(1 to 5)
(190). Which option can be used to defines a variable ‘a’ and assigned value 10 in ‘R’ software ?
(A)a = 10  (B) a : 10  (C) a <- 10  (D) a -> 10 
(191). In ‘R’ software, which command is used to displays a list of the variables use within programming ?
(A)list() (B)var() (C) data() (D) Is()

Mahesh Sir - 9724665284 PAGE NO: 118 App : Clear Code Technical Technical
(192). In ‘R’ software, which command is used to find the maximum value ?
(A)Max(list1,list2) (B) Maximum(list1,list2) (C) Max(list) (D) Maximum(list)
(193). In ‘R’ software, which option specifies the data list type of argument while creating a graph ?
(A) Bar (B)Bargraph (C)Barplot (D)Barview
(194). In ‘R’ software, which argument specifies the X-axis ?
(A)x.arg (B)xlab (C)xlim (D) x-axies
(195). In ‘R’ software, which argument specifies the value for the bar ?
(A)name.arg (B)name.lab (C)name.main (D)name.lim
(196). In ‘R’ software, which argument apecifies the border color ?
(A)Bordercolor (B) Border (C)Borderview (D)bordercol
(197). Which processing can be done with the help of ‘R’ ?
(A)Stastical (B) Graphical (C) Histogram (D) All of these
(198). From the following, in which working areas one has to work on different projects ?
(A)Constuction, engineering, consulting (B) Business and services
(C)software development (D) All of these
(199). How should planning be done of projects ?
(A) That it completes on time (B) that it completes within budget
(C)(A) and (B) both (D) None of these
(200). Which software helps the project managers throughout the life cycle of their projects ?
(A) ‘R’ software (B)skype
(C)RationalPlan (D) Archive manager
(201). From following, which option shows the desktop product in RationalPlansoftware ?
(A)RationalPlan single project (B)RationalPlan Multi project
(C)RationalPlan project viewer (D) All of thes
(202). RationalPlan software is available for which operating system ?
(A) Windows (B) Linux (C) Mac (D) All of theses
(203). RationalPlan software supports to which later version of Ubuntu ?
(A) 10.04 (B) 12.04 (C) 13.04 (D) 14.04
(204). In RationalPlan software, which desktop products has no interrelation between different projects ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan multi project (D) All of these
(205). RationalPlan single project allows the manager to associate which general project information ?
(A) Name, notes (B) Links, assumptions (C) Constraints (D) All of these
(206). RationalPlan single provides which facility from the following ?
(A) To create calendars (B) To edit calendars (C) To delete calendars (D) All of these
(207). RationalPlan single project provides which tracking tools ?
(A) Critical path, mark completion value for tasks (B) work and cost time phased information
(C)cost of different phased information (D) All of these
(208). In RationalPlan software, which dektop product allows to manage projects that share company resources
across projects ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan multi viewer (D) All of these
(209). In RationalPlan multi project includes all the features of which product ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan multi viewer (D) All of these
(210). What does RationalPlan multi project allow ?
(A) Links between tasks pertaining to different projects
(B) Analyzes all over project data
(C)creates a project portfolio view
(D) All of these
(211). In RationalPlan software, which dektop product is an additional tool developed to share the project in its
original file format ?
(A)RationalPlan single project (B)RationalPlan multi project
(C)RationalPlan project viewer (D) All of these

Mahesh Sir - 9724665284 PAGE NO: 119 App : Clear Code Technical Technical
(212). From following, which option shows the use of RationalPlan viewer?
(A) use for resources to see their assignments
(B)use of check and overview the project’s evolution without making changes to the schedule
(C)(A) and (B) both
(D) None of these
(213). Today various messaging services are used for which purpose ?
(A) Chatting (B) Photograph (C) Multimedia (D) Processing
(214). From the following, who allows the users to make calls over the internet using computer system ?
(A) Skype (B)Skrype (C)Skreyp (D) Sky
(215). From the following the calls to which are charged via a debit based user account system ?
(A) Telephones (B) Mobile phones (C)(A) and (B) both (D)akype
(216). Skype provides which facility from the following ?
(A)File transferring (B) Video conferencing (C) Free calling (D) All of these
(217). Skype has which type of source code ?
(A) Open source (B) Proprietary (C)(A) and (B) both (D) None of these
(218). Which configuration is needed to use Skype ?
(A)sound input (B) Sound output (C)(A) and (B) both (D) None of these
(219). In desktop computers, which devices can be used to get Skype facility ?
(A) Headset (B) Speaker (C) Web-camera (D) All of these
(220). If the skype is opened for the first time then it will display which window to its user ?
(A) License Agreement window (B) License Wishing Message Window
(C) License Welcome Message Window (D) License using Message Window
(221). From the following, which file describes the entire directory structure in it?
(A) Archive (B)Arcive (C)Archip (D)Arcrip
(222). Using gzip program an uncompressed file in the tar format is compressed in the zip format proving tar.gz
extension, what it is known as?
(A) Tat ball (B)Tar ball (C)Tet ball (D)Tak ball
(223). Which type of tools are available in Ubuntu?
(A) Multimedia audio (B)Multimedia video (C)(A) and (B) both (D) None of these
(224). In VLC media player window, what does progress bar show?
(A) How much current track played (B) Duration of current track played
(C)(A) and (B) both (D) How much track left and its duration
(225). Which of the following refers to a file that has an entire directory structure inside it?
(A)apache (B)archie (C)archl (D)archive
(226). For which type of archives is the password protection option available?
(A) zip (B)tar (C)tar.gz (D) both zip and tar.gz
(227). Which software helps the project managers throughout the life cycle of their projects?
(A) ‘R’ software (B)Skype (C)RationalPlan (D)Archive manager

Mahesh Sir - 9724665284 PAGE NO: 120 App : Clear Code Technical Technical

You might also like