0% found this document useful (0 votes)
15 views22 pages

M Set 02 PGT (Direct) 051 To 130 Computer Science English

The document consists of a series of multiple-choice questions related to computer science concepts, including storage device hierarchy, DMA, memory management, disk scheduling algorithms, Boolean algebra, programming languages like Visual Basic and C++, and data structures. Each question presents four options, from which the correct answer must be selected. The questions cover a range of topics, including algorithms, programming constructs, and theoretical concepts in computer science.

Uploaded by

techytanzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views22 pages

M Set 02 PGT (Direct) 051 To 130 Computer Science English

The document consists of a series of multiple-choice questions related to computer science concepts, including storage device hierarchy, DMA, memory management, disk scheduling algorithms, Boolean algebra, programming languages like Visual Basic and C++, and data structures. Each question presents four options, from which the correct answer must be selected. The questions cover a range of topics, including algorithms, programming constructs, and theoretical concepts in computer science.

Uploaded by

techytanzo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Set-02 1 Computer Science P-PGT (1 to 80)

1. Which of the following options states the correct storage - device hierarchy in terms of increasing
size in a computer system ?
(1) cache, register, main memory, solid state disk
(2) registers, cache, main memory, solid state disk
(3) registers, cache, solid state disk, main memory
(4) cache, register, solid state disk, main memory

2. DMA steals cycle from the __________.


(1) I/O device or Hard disk
(2) Physical Memory
(3) Cache Memory
(4) Central Processing Unit

3. Consider the following structure of 2 - address instruction in a machine.


opcode operand1 operand2
8 8 16
If the first operand is in a general purpose register and second operand is in the memory, which
of the following statements about the machine is correct ?
(1) There are 256 registers and memory size is 64 K. bytes
(2) There are 8 instructions and 8 registers
(3) There are 256 registers and 216 KB memory
(4) There are 256 instructions and 216 KB memory

4. Consider the memory reference string given below, for a memory with 3 frames per process.
1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5
The number of page faults for FIFO page replacement policy are __________.
(1) eleven
(2) ten
(3) twelve
(4) nine

5. Which of the following statements about disk scheduling algorithms is correct ?


(1) The disk arm behaves like an elevator in SCAN algorithm
(2) FCFS provides fastest service to the disk requests
(3) SSTF algorithm is an optimal algorithm
(4) SCAN algorithm provides more uniform wait time compared to C - SCAN algorithm

6. Which of the following statements is incorrect ?


(1) Counting semaphore can be used to control access to finite number of instances of a
resource
(2) Reader writers problem typically arises when several concurrent processes share the data
base
(3) Banker’s algorithm prevents dead lock
(4) A computer system is in a safe state only if there exists a safe sequence
Set-02 2 Computer Science P-PGT (1 to 80)
7. Consider three processes P1, P2, P3, requiring 24, 3, 3 units of CPU time respectively. For time
quantum of 4 units and Round - Robin scheduling policy, the average waiting time is __________.
(1) 5.66 units
(2) 17 units
(3) 10 units
(4) 15.66 units

8. Which of the following options states the complete and correct sequence of steps to execute a
program on a personal computer ?
(1) code → compile → link → load → execute
(2) design → code → compile → link → load → execute
(3) code → compile → load → execute
(4) design → code → compile → load → execute

9. Identify the Hexadecimal equivalent of the decimal number.


(3245)10 = ( ? )16
(1) CBF
(2) CED
(3) CAD
(4) CBA

10. Binary equivalent of the Hexadecimal number (7A4)16 is :


(1) (11110100100) 2
(2) (10000101111) 2
(3) (10010001111) 2
(4) (10000010100) 2

11. The Boolean expression A'B'+AB'+A'B is equivalent to :


(1) A NAND B
(2) A NOR B
(3) A XOR B
(4) A OR B

12. Identify the simplified and equivalent Boolean expression for the K - Map :

(1) c.d'+ c'.d


(2) c'
(3) d'
(4) c.d
Set-02 3 Computer Science P-PGT (1 to 80)
13. Which of the following Boolean expression correctly represents the Logic circuit diagram ?

(1) (A+B).C'
(2) A.B+C'
(3) A.C'+B.C'
(4) (A+B)'.C

14. In Boolean Algebra, the expression a.b+a.b9 is equivalent to :


(1) a
(2) b
(3) a.b
(4) a+b

15. What will the following expression evaluate to ?


3+2∗5−32/8
(1) 9
(2) 24
(3) 5.75
(4) 21

16. What is the correct order of execution of logical operators present in an expression ?
(1) NOT BRACKETS AND OR
(2) NOT AND OR BRACKETS
(3) NOT OR AND BRACKETS
(4) BRACKETS NOT AND OR
Set-02 4 Computer Science P-PGT (1 to 80)
17. How many times the loop will be executed in the following flowchart ?

(1) 80
(2) 1
(3) 2
(4) 3
Set-02 5 Computer Science P-PGT (1 to 80)
18. Which of the following flowcharts will be most appropriate for printing first 8 multiple of 9 ?

(1) (2)

(3) (4)
Set-02 6 Computer Science P-PGT (1 to 80)
19. Which of the following is depicted from the flowchart shown below?

(1) Sequencing
(2) Branching
(3) Looping
(4) Overloading

20. Assume the values of X, Y and Z variables are assigned with values as −10, 20 and −30 respectively
find out, which of following expression will evaluate to true ?
(1) X > Z and Y > = Z
(2) X > Y and X < = Z
(3) X > = Z and Z < = Y
(4) Y < = X and Z < = Y

21. Which of the following is the correct order of Problem Solving steps ?
(A) Algorithm Development
(B) Coding
(C) Analysis of problem
(D) Testing & Debugging

(1) (A), (B), (C), (D)


(2) (C), (A), (D), (B)
(3) (A), (C), (B), (D)
(4) (C), (A), (B), (D)

22. Which of the following operator is not an arithmatic operator ?


(1) +
(2) ∗
(3) −
(4) >
Set-02 7 Computer Science P-PGT (1 to 80)
23. Which of the following cannot be used to represent a variable name in VISUAL BASIC ?
(1) 25 Values
(2) Number9
(3) _Score
(4) Five6Five

24. In Visual Basic, __________ is the file extension of Project file.


(1) .frm
(2) .vb
(3) .vbp
(4) .vbproj

25. In Visual Basic, if CHR(65) is ''A'' what will be displayed in text box with following statement ?
txtBox.Text = ''A'' & CHR(77) & ''T''
(1) 657784
(2) AMT
(3) A M T
(4) 65 77 84

26. In Visual Basic, variable declared inside a procedure are said to have __________ scope.
(1) GLOBAL
(2) LOCAL
(3) CLASS - LEVEL
(4) PROGRAM - LEVEL

27. In Visual Basic, different items appearing in the same value list of a SELECT CASE block must be
separated by :
(1) , (COMMA)
(2) ; (SEMI COLON)
(3) : (COLON)
(4) # (HASH)

28. Key words in Visual Basic are words that :


(1) have specific meaning in Visual Basic that cannot be used for naming variables
(2) can be used for naming variables
(3) are used to be prefixed for control names such as txt, btn, lbl and lst
(4) are used as names of controls
Set-02 8 Computer Science P-PGT (1 to 80)
29. Consider the following expression tree.

In-order, pre-order and post-order traversal of this tree will result into which of the following
expressions, respectively.
(1) a+bc∗, +a∗bc, abc∗+
(2) a+b∗c, +abc∗, abc∗+
(3) a+b∗c, +a∗bc, abc∗+
(4) a+b∗c, +a∗bc, abc+∗

30. Running time of a ‘for’ loop is __________ the running time of the statements inside the
for loop times the number of iterations.
(1) atleast
(2) atmost
(3) equal to
(4) independent of

31. Consider a stack S implemented using a link list. When does the following function return
TRUE ?
int f1(stack S)
{return
S→Next = =NULL;}
(A) When the stack is full.
(B) When the stack is empty.
(C ) When no memory is available.
Mark the correct option.
(1) Only (A) is correct
(2) Only (B) is correct
(3) Only (C) is correct
(4) Only (B) and (C) are correct

32. Which of the following data structures are most appropriate for searching a key in the list of
elements, using Binary and sequential search algorithms ?
(1) Link list and Queue, respectively
(2) Link list and Array, respectively
(3) Array and Link list, respectively
(4) Array and Stack, respectively
Set-02 9 Computer Science P-PGT (1 to 80)

33. Following situation (s) will result in an underflow, when a node is deleted from the link list.
(A) list is full
(B) list is empty
(C) list has only one element
Choose the correct option.
(1) Only (A) is correct
(2) Only (B) is correct
(3) Only (C) is correct
(4) Only (B) and (C) are correct

34. Given the following program fragment to add two integer arrays A and B, each of size N.
The sum is stored in integer array C of the same size.
for (i=1; i<=N; i++)
C[i] = A[i]+B[i];
The running time of this for loop is __________.
(1) O(1)
(2) O(N)
(3) O(2N)
(4) O(N2)

35. Which of the following cannot be represented as a tree ?


(1) Unix directory without links
(2) Table of Content of a book
(3) Customer calls in a call centre
(4) Arithmetic expression
Set-02 10 Computer Science P-PGT (1 to 80)

36. If all required header files are already included, identify the output of the following C++
code from the given options :
class Student
{
int AdmNo, Class;
public;
Student (int AN, int C = 1)
{ AdmNo = AN ; Class = C; }
void Promoted (int C = 1)
{ Class +=C; }
void Display ()
{ cout<<AdmNo << '' : '' <<Class<<endl; }
};
void main ()
{
Student S (1001);
S.Promoted (3);
S.Display ();
}
(1) 1001 : 1
(2) 1001 : 4
(3) 1001 : 3
(4) 1001 : 2

37. Observe the following C++ code and assume that all desired header files are already included.
Identify the possible output from the given options :
void main ()
{
int M[] = {80, 60, 70, 90};
char ∗S = ''MARKS'';
int ∗P;
P = M;
P++; S++;
cout<<S<<∗P<<end1;
}
(1) MARKS 80
(2) ARKS 60
(3) RKS 70
Set-02 11 Computer Science P-PGT (1 to 80)
(4) KS 90
38. Select the correct output of the following C++ program segment assuming all necessary header
files are correctly included.
void main ()
{
char ∗S = ''Inheritance'';
S +=6 ;
cout<<S<< endl;
}
(1) itence
(2) tence
(3) Tence
(4) Inheri

39. This question is based on the following C++ code segment and class FUN :
class FUN
{
int CODE ;
public :
FUN ( ); //Function1
FUN (int C); //Function2
FUN (FUN & F); //Function3
void DISP ( ); //Function4
~FUN ( ); //Function5
};
void main ( )
{
FUN F1 ;
________ // BLANK
______
____}

Which of the following is an example of default constructor ?


(1) Function 1
(2) Function 2
(3) Function 3
(4) Function 5
Set-02 12 Computer Science P-PGT (1 to 80)
40. This question is based on the following C++ code segment and class FUN :
class FUN
{
int CODE ;
public :
FUN ( ); //Function1
FUN (int C); //Function2
FUN (FUN & F); //Function3
void DISP ( ); //Function4
~FUN ( ); //Function5
};
void main ( )
{
FUN F1 ;
________ // BLANK
______
____}

Which of the following C++ command/ statement can be written in the line marked as
BLANK to invoke the function whose prototype is marked as Function 3 ?
(1) FUN F2;
(2) FUN F2 (501);
(3) FUN F2 (F1);
(4) FUN F2 = F1;

41. This question is based on the following C++ code segment and class FUN :
class FUN
{
int CODE ;
public :
FUN ( ); //Function1
FUN (int C); //Function2
FUN (FUN & F); //Function3
void DISP ( ); //Function4
~FUN ( ); //Function5
};
void main ( )
{
FUN F1 ;
________ // BLANK
______
____}

Which of the following is called a destructor of the class FUN ?


(1) FUNCTION 1
(2) FUNCTION 2
(3) FUNCTION 3
(4) FUNCTION 5
Set-02 13 Computer Science P-PGT (1 to 80)
42. Name the type of Inheritance if Sports, Coach, Player are C++ classes and →denotes inheritance.
Sports

Coach

Player
(1) Multiple Inheritance
(2) Multi-level Inheritance
(3) Doubly Inheritance
(4) Hybrid Inheritance

43. Consider the following inheritance in C++


class BASE
{
int B1 ;
protected :
int B2 ;
public :
____
____
void FUNB( )
};
class DERIVED : public BASE
{
int D1 ;
public :
____
____
};
What will be the visibility modes of B2 and FUNB( ) in the derived class DERIVED ?
(1) B2 → protected, FUN B( ) → public
(2) B2 → protected, FUN B( ) → protected
(3) B2 → public, FUN B( ) → public
(4) B2 → private, FUN B( ) → protected

44. Which of the following C++ Statements will open a text file ''VIEWS. TXT'' in which read as well as
write activities are required at the same time ?
(1) fstream F (''VIEWS.TXT'', ios :: read?ios :: write);
(2) fstream F (''VIEWS.TXT'', ios :: in?ios :: out);
(3) fstream F (''VIEWS.TXT'', ios :: in?out);
(4) fstream F (''VIEWS.TXT'', ios :: read?write);

45. Which of the following file stream function will not move the file pointer to (N+1)th record of a
binary file F created with the help of objects of class EMPLOYEE ?
(1) F. seekp (N∗sizeof (EMPLOYEE));
(2) F. seekg (F.tellg( )∗N);
(3) F. seekg (sizeof (EMPLOYEE)∗N);
(4) POS = sizeof (EMPLOYEE)∗N;
Set-02 14 Computer Science P-PGT (1 to 80)
F. seekp (POS);

46. An attribute, which can be referenced to connect with primary key of another table is known as :
(1) Candidate key
(2) Alternate key
(3) Referpoint key
(4) Foreign key

47. Which of the following SQL command will delete the structure as well as content of a table
EMPLOYEE ?
(1) ERASE EMPLOYEE;
(2) DELETE FROM EMPLOYEE;
(3) DROP EMPLOYEE;
(4) DROP TABLE EMPLOYEE;

48. This question is based on the following SQL Table.


Mr. Aman, a Computer Science Teacher maintains the details of his class 12 Students is a SQL
table as follow :
Table Name : MYSTUDENT

ROLLNO NAME SEC MARKS


80105 MARIA A 83.0
80108 AMAR B 44.0
80109 MANPREET A 92.0
80112 SAMEER A 81.0
80115 AKBAR B NULL

Identify the most Suitable Command to display the merit List of his students where the
details will be displayed in descending order of their marks. If some students have same
MARKs, their detail will be displayed in ascending order of their ROLLNO.
(1) SELECT ∗ FROM MYSTUDENT ORDER BY DESC MARKS, ASC ROLLNO;
(2) SELECT ∗ FROM MYSTUDENT ORDER BY MARKS DESC, ROLLNO ASC;
(3) SELECT ∗ FROM MYSTUDENT ORDER BY MARKS; ROLLNO DESC, ASC;
(4) SELECT ∗ FROM MYSTUDENT ORDER BY MARKS DESC; ROLLNO ASC;
Set-02 15 Computer Science P-PGT (1 to 80)
49. This question is based on the following SQL Table.
Mr. Aman, a Computer Science Teacher maintains the details of his class 12 Students is a SQL
table as follow :
Table Name : MYSTUDENT

ROLLNO NAME SEC MARKS


80105 MARIA A 83.0
80108 AMAR B 44.0
80109 MANPREET A 92.0
80112 SAMEER A 81.0
80115 AKBAR B NULL

Which of the following command can display the SEC wise Average of the student ?
(1) SELECT SEC, AVG (MARKS) FROM MYSTUDENT ORDER BY SEC;
(2) SELECT SEC, AVG (MARKS) FROM MYSTUDENT GROUP BY MARKS;
(3) SELECT ∗SEC, AVG (MARKS) FROM MYSTUDENT GROUP BY SEC;
(4) SELECT AVG (MARKS) FROM MYSTUDENT ORDER BY SEC;

50. This question is based on the following SQL Table.


Mr. Aman, a Computer Science Teacher maintains the details of his class 12 Students is a SQL
table as follow :
Table Name : MYSTUDENT

ROLLNO NAME SEC MARKS


80105 MARIA A 83.0
80108 AMAR B 44.0
80109 MANPREET A 92.0
80112 SAMEER A 81.0
80115 AKBAR B NULL

Write the output of the following command.


SELECT AVG(MARKS)
FROM MYSTUDENT;
AVG (MARKS)
(1) 60.0

AVG (MARKS)
(2) 300.0

AVG (MARKS)
(3) Error

AVG (MARKS)
(4) 75.0
Set-02 16 Computer Science P-PGT (1 to 80)
51. This question is based on the following SQL Table.
Mr. Aman, a Computer Science Teacher maintains the details of his class 12 Students is a SQL
table as follow :
Table Name : MYSTUDENT

ROLLNO NAME SEC MARKS


80105 MARIA A 83.0
80108 AMAR B 44.0
80109 MANPREET A 92.0
80112 SAMEER A 81.0
80115 AKBAR B NULL

Which of following command can be used best to display the SEC. Where Mr. Aman teacher
Computer Science ?
(1) SELECT DISTINCT SEC FROM MYSTUDENT;
(2) SELECT DIFFERENT SEC FROM MYSTUDENT;
(3) SELECT ALL SEC FROM MYSTUDENT;
(4) SELECT UNIQUE SEC FROM MYSTUDENT;

52. Consider the following tables in a database SCHOOL :

Table Name : STUDENT Table NAME : TEACHER


AdmNo SNAME T_ID TNAME
101 AMAR T05 AMAN
205 MARIA T06 NUSRAT
410 MALALA

Which of the following SQL command will produce an output as :

SNAME TNAME
AMAR AMAN
MARIA AMAN
MALALA AMAN
AMAR NUSRAT
MARIA NUSRAT
MALALA NUSRAT

(1) SELECT SNAME, TNAME FROM STUDENT, TEACHER;


(2) SELECT SNAME FROM STUDENT, TNAME FROM TEACHER;
(3) SELECT SNAME, TNAME FROM STUDENT X TEACHER;
(4) SELECT SNAME FROM STUDENT, SELECT TNAME FROM TEACHER;
Set-02 17 Computer Science P-PGT (1 to 80)
53. A relation which is in 1NF and no attribute, that is not a part of the Primary key, is partially
dependent only on a portion of the Primary key.
(1) 2NF
(2) 3NF
(3) 4NF
(4) 5NF

54. Which of the following is not an example of an application of a Database ?


(1) VIDEO Editing
(2) Profile Management System
(3) Result Management System
(4) Inventory Control System

55. Which of the following options appropriately represent the relationship shown in the
diagram ?

(1) ONE - TO - ONE


(2) ONE - TO - MANY
(3) MANY - TO - ONE
(4) MANY - TO - MANY

56. TYPE, START and VALUE are attributes of which tag in HTML ?
(1) <OL>
(2) <UL>
(3) <DL>
(4) <LL>

57. Which of the following is not possible using the <BODY> tag attributes ?
(1) Set the background colour of the webpage
(2) Set the background image of the webpage
(3) Set the background Sound for a webpage
(4) Set the alignment for the webpage
Set-02 18 Computer Science P-PGT (1 to 80)
58. Identify the error in the following HTML code :
<HTML>
<BODY>
<FORM ID = ''FORM1'' METHOD = POST>
<BR> SELECT YOUR FAVOURITE CHANNEL :
NETFLIX <INPUT TYPE = CHECKSELECT>
AMAZON PRIME <INPUT TYPE = CHECKSELECT>
</FORM>
</BODY>
</HTML>
(a) NAME instead of ID and CHECKBOX instead of CHECKSELECT.
(b) METHOD = GET instead of POST.

(1) Only (a) is correct


(2) Both (a) and (b) are correct
(3) Only (b) is correct
(4) The code is correct and has no errors

59. The __________ attribute of the <A> tag is used to specify the Section names while creating
an internal link.
(1) HREF
(2) ID
(3) ACTION
(4) NAME

60. What will be the output of the following HTML code snippet ?
<IMG SRC = ''FLOWER.JPG'' HEIGHT = 100 WIDTH = 40 BORDER = 10>
(1) The image flower.jpg will be displayed with 100 pixel height 40 pixel width and a border
with RGB code as 10
(2) The image flower.jpg will be displayed as a 100 px by 40px image with a 10px thick border
(3) The image flower.jpg will be displayed as a 40 cm by 100 cm image with a 10 cm thick border
(4) The image flower.jpg will be displayed as a 100 mm by 40 mm image with a 10 mm thick
border
Set-02 19 Computer Science P-PGT (1 to 80)
61. Which of the following is the correct code to create a framed webpage as in the figure
below ?

(1) <FRAMESET ROWS = ''25%, 75%''>


<FRAME SRC = ''A.html''>
<FRAMESET COLS = ''50%, 50%''>
<FRAME SRC = ''B.html''>
<FRAME SRC = ''C.html''>
</FRAMESET>
</FRAMESET>
(2) <FRAMESET COLS = ''25%, 75%''>
<FRAME SRC = ''A.html''>
<FRAMESET ROWS = ''50%, 50%''>
<FRAME SRC = ''B.html''>
<FRAME SRC = ''C.html''>
</FRAMESET>
</FRAMESET>
(3) <FRAME ROWS = ''25%, 75%''>
<FRAMESET SRC = ''A.html''>
<FRAME COLS = ''50%, ∗''>
<FRAMESET SRC = ''B.html''>
<FRAMESET SRC = ''C.html''>
</FRAME>
</FRAME>
(4) <FRAME COLS = ''25%, 75%''>
<FRAMESET SRC = ''A.html''>
<FRAME ROWS = ''50%, ∗''>
<FRAMESET SRC = ''B.html''>
<FRAMESET SRC = ''C.html''>
</FRAME>
</FRAME>

62. Which of the following attribute of the <FRAME> tag Specifies the distance between the top
and bottom edge of the frame and the frame contents ?
(1) MARGINHEIGHT
(2) MARGINWIDTH
(3) FRAMEHEIGHT
(4) FRAMEWIDTH
Set-02 20 Computer Science P-PGT (1 to 80)
63. SubscriptionCost = new Array (3)
Which of the following option is incorrect about the above statement ?
(1) It creates an array to store 3 elements
(2) It creates a fixed - size array of 3 elements that cannot be resized
(3) The 3 elements can be stored at locations Array(0), Array(1) and Array(2)
(4) The 3 elements can be stand at locations SubscriptionCost (0), SubscriptionCost (1) and
SubscriptionCost (3)

64. Name the top level object also known as the default object of the JavaScript Object Model.
(1) Document
(2) Body
(3) Location
(4) Window

65. Which of the following is not an advantage of client - side scripting ?


(1) Fast processing as data is not sent to the server
(2) Give developers more control over behaviour of web widgets
(3) Allow for more interactivity by immediate responses to user’s actions
(4) Give developers more control for data repositories across systems

66. Which of the following statement is false with respect to CSS ?


(1) It Stands for Cascading Style Sheets
(2) It can control the layout of multiple webpages with a single file
(3) CSS describes how HTML elements are Stored within tags
(4) CSS describes how HTML elements are displayed on Screen

67. Which of the following is not a feature of XML ?


(1) XML is designed to carry data
(2) XML is a complement to HTML
(3) XML can separate design from HTML
(4) XML can be used to create new languages

68. In order to interpret XML documents, you need to :


(1) Use standardized predefined tags
(2) Specify the tags separately in a file
(3) Have a document type definition for the tags
(4) Use standardized HTML tags

69. XML is a Subset of :


(1) HTML
(2) SGML
(3) DGML
(4) GML
Set-02 21 Computer Science P-PGT (1 to 80)
70. Which of the following statement is false with respect to DOM ?
(1) DOM is a way to represent the webpage in a structured hierarchical way
(2) With DOM we can easily access and manipulate tags, IDs, classes or elements of HTML
(3) Using DOM, the CSS gets access to the HTML and the JavaScript of the web page
(4) Window object is always at the top of the DOM hierarchy

71. Which of the following option correctly matches the given events with the appropriate
interface element with respect to VBScript ?
Event Interface Element
Onclick Text
OnMouseOver Button
OnChange Image
(1) Button - OnMouseOver, Text - Onclick, Image - OnChange
(2) Button - OnChange, Text - Onclick, Image - OnMouseOver
(3) Button - Onclick, Text - OnChange, Image - OnMouseOver
(4) Button - OnChange, Text - OnClick, Image - OnChange

72. What is the keyword used to end the WHILE Loop in VBScript ?
(1) LOOP
(2) NEXT
(3) END
(4) WEND

73. The act of preparing movie files and the accompanying HTML code for uploading movies to
internet websites is called ?
(1) Previewing
(2) Exporting
(3) Prepare Protect
(4) Publishing

74. The term used to animate each letter of a word Separately is __________.
(1) Frame - by - frame animation
(2) Convert to symbol
(3) Break apart
(4) Morphing

75. The __________ is a holding place for all symbols and imported images and sounds within a
single flash file.
(1) Library
(2) Timeline
(3) Tools Panel
(4) Properties Panel
Set-02 22 Computer Science P-PGT (1 to 80)

76. To make a layer completely transparent you will :


(1) Increase the opacity of the layer
(2) Decrease the opacity of the layer
(3) Make the canvas transparent
(4) All layers are by default transparent

77. Which of the following crime does not fall under CYBER CRIME ?
(1) Posting abusive text messages on Social media
(2) Stealing a Pen drive having important files
(3) Getting unauthorised access to someone’s online account
(4) Stealing Computer Speaker from friend’s house

78. Ms. Rabda is a CEO of a multinational company and she is planning to connect 3 offices of
nearby cities with the help of wired media. Out of the following which wired media you
would suggest for the same.
(1) CAT6 CABLE
(2) COAXIAL CABLE
(3) TWO PAIR TELEPHONE CABLE
(4) OPTIC FIBER CABLE

79. What is the full form for GSM ?


(1) General System for Mobile Communication
(2) Global Synchronization for Mobile Communication
(3) Global System for Mobile Communication
(4) Global System for Mobile Community

80. Which topologies of networks is represented in the following diagram ?

(1) BUS
(2) RING
(3) STAR
(4) TREE

You might also like