You are on page 1of 9

www.studentsbooklet.

com
MONTHLY
TEST
NOVEMBE
R 2012
OM!"TER
S#ENE
Time: 1:30 hours
$oose t$e best
%nswe&'
1
.
Which is the most powerful feature of an object oriented programming
language?
a) Encapsulation

.
Which can be added to enhance the inheritance
functionalit!?
a) "ttributes and data t!pes
c) "ttributes and methods
3
.
Which of the following #e!words issued to define the name of the deri$ed
class?
a) %lass
&
. What must be used between deri$ed and base class?
a) : :
'
. (ow man! access specifiers are there in inheritance?
a) Two b) )our c) *i+
,
.
Which is a default $isibilit!
mode?
a) -ublic
b)
-rotected c) -ri$ate
.
. (ow man! t!pes of inheritance are there?
a) Two b) Three c) )i$e
/
.
Which form on inheritance is reflected b! the transiti$e nature of
inheritance?
a) *ingle
b)
0ultiple c) (ierarchical
1
. Which of the following object classes are not declared?
a) %oncrete b) 2oid c) "bstract
10. (ow man!
elements are
needed atleast
to reach out the
benefits of 3T to
the common
man?
a) ', b) 3
c) & d) 1/
1
www.studentsbooklet.com
1
1
. What will be the /'4 usage of computer?
a) Word
processing
1

. %5T means
a) %omputer 5ased Tutorials
c) %omputer 5ased Teacher
13. Which of
the
following
introduced
in ban#s
reduced
the time
re6uired to
pro$ide
ser$ice to
the used?
a) *oftware b) (ardware c) 0ethods
1
&
. Which will enable the common man to put computers to a better use?
a) "pplication
b)
Entertainment c) Edication
1
'
.
Which permits ban#ing from the comfort of the home b! using internet
facilit!?
a) e 7 commerce b) e 7 ban#ing c) e 7 shopping
1,. "T0 means
a) "uto Tele 0achine b) "utomatic Teller 0achine
c) "utomatic Tele
0achine d) "utomated Tele 0achine
1
.
.
Which enables online educational programs loading to degrees and
certifications?
a) e 7 Education
b) e 7
8earning c) e 7 *hopping
1
/
. 3TE* stands for?
a) 3t En$ironment
*tudies b) 3t Enabled *er$ices
c) 3t E$olution
*tudies d) 3t Enabled *tudies
11.
Wh
ich
ca
n
be
coll
ect
ed
for one
purpose a)
9ata b)
-rogram
ma!
be
usef
ul
for
som
e
othe
r
purp
ose
? c)
%o
mp
uter
d)
3TE
*

0
. Which ser$ice comprise punching data from manuall! filled forms: images?
a) 950*
b) %all
centres c) 9igiti;ation

1
.
Which of the following helps us in accessing web based
ser$ices?
a) -rograms
b)
"pplications c) %omputers

. Which of the following ma! be digiti;ed?


a) 0aps
b)
0anuscripts
c) 3mages and
*ound
2
www.studentsbooklet.com

3
. (ow man! steps are in$ol$ed in 0edical transcription?
a) Two

&
.
Which of the following facilities communication and supports the insurance
claims?
a) 0edical
transcription

'
. Which of the following is happening all o$er the globe?
a) -rograms

,
.
Which of the following is the #e! for effecti$e and profitable use of 3T in
organi;ations?
a) 9ata
management

.
%omputer has its roots in the wor# of whom during World War
33?
.
a) %harles 5abbage b) (erman (ollirich
c) 5laise -ascal
d) <orbert
Wiener

/
.
Which of the following securit! refers to protecting data and computer s!stem
against
negligence of emplo!ees?
a) 9ata b) -h!sical c) -ersonal

1
. Which of the following is an! illegal acti$it! using computer software?
a) %omputer crime b) 9ata crime c) *oftware crime
30. 5! how man!
percentage
the computer
crimes are a
=o$ernment
happening
within the
compan!?
a) ,04 b) .'4 c) /04 >
3
1
.
0a#ing and using duplicate hardware and software is called
????????
a) %rime b) *ecurit!
c)
-irac!
3

.
(ow man! #nown $irus programs are in
e+istence?
a) '.000 b) ,.000
c)
.'000
3
3
.
Which laws pre$ent computer crimes in
3ndia?
a) %!ber b) %rime c) 8egal
3
&
.
Which is the illegal access to the networ# or computer
s!stem?
a) 2irus b) %rac#ing c) "uthentication
3
www.studentsbooklet.com
3'. (ow man! new $iruses are found each da!?
a) .
##. (nswe& %n) TEN
*uest+ons'
36. W
ha
t
ar
e
th
e
ad
$a
nt
ag
es
of
in
he
rit
an
ce
?
37. 9
efi
ne
ba
se
cl
as
s.
38. <
a
m
e
th
e
t!
pe
s of
inheritance.
39. (ow the
computers are
used in
entertainment?
40. What are
the
technical
elements
!ou need
to reach
out the
benefits
of 3T to
the
common
man?
41. (ow the
computers are
used in areas
of education?
42. What is meant
b! 3TE*?
43. Write a short
note on
medical
transcription.
44. 0ention 3T
enabled
ser$ices.
45. Write a note on
crac#ing.
46. What is meant
b! -irac!?
47. What are the
general
guidelines on
computer
ethics needed?
!(RT ,
##. (nswe& %n)
-O"R *uest+ons'
./012
203
48. E+
pl
ai
n
dif
fer
en
t
t!
pe
s
of
da
ta
se
cu
rit
!.
49. W
rit
e
bri
efl
!
ab
ou
t
9
at
a 0anagement.
50. 0ention the
area where
software has
been
de$eloped.
51. E+plain the
different t!pes
of inheritance.
52. Write a note on
call centres.
53. What will be
the output of
the following
program?
1# include
@iostream.
hA
2# include
@conio.hA
%lass base
B
-ublic:
5ase C )
B
%out @ @ D3n
constructor
of base class
EFG
H
4
www.studentsbooklet.com
1~ base C )
H
%out @ @ D3n destructor of base class EFG
H
HG
%lass deri$ed : -ublic base
B
-ublic :
deri$ed C )
B
%out @ @ D3n %onstructor of deri$ed EFG
H
2~ deri$ed
B
%out @ @ I3n 9estructor of deri$ed EJG
H
HG
%lass deri$ed : -ublic base
B
-ublic:
deri$ed C )
B
%out @ @ I3n constructor of deri$ed EJG
H
HG
2oid main C )
B
deri$ed +G
H
5

You might also like