New ! Computer Applications MCQ Practise Tests



All Chapter 1 Marks

12th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 01:00:00 Hrs
Total Marks : 70
    70 x 1 = 70
  1. __________ refers to any type of application that involves more than one type of media such as text, graphics video animation and sound.

    (a)

    an executable file

    (b)

    desktop publishing

    (c)

    multimedia

    (d)

    hypertext

  2. Find the odd one on the following which is not an image format.

    (a)

    TIFF

    (b)

    BMP

    (c)

    RTF

    (d)

    JPEG

  3. Multimedia has _________ major components

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    5

  4. Which of the following is an audio file format used by apple?

    (a)

    WAV

    (b)

    RA

    (c)

    OGG

    (d)

    AIFF

  5. Place option is present in ______ menu.

    (a)

    File

    (b)

    Edit

    (c)

    Layout

    (d)

    Window

  6. Which tool lets you edit text?

    (a)

    Text tool

    (b)

    Type tool

    (c)

    Crop tool

    (d)

    Hand tool

  7. Which of the following is a DTP software?

    (a)

    page maker

    (b)

    in design

    (c)

    quark x press

    (d)

    all of the above.

  8. ___________ is the top most part of the windows.

    (a)

    title bar

    (b)

    menu bar

    (c)

    tool bar

    (d)

    tool box.

  9. The _____ diagram gives a logical structure of the database graphically?

    (a)

    Entity-Relationship

    (b)

    Entity

    (c)

    Architectural Representation

    (d)

    Database

  10. Communication is established with MySQL using

    (a)

    SQL

    (b)

    Network calls

    (c)

    Java

    (d)

    API’s

  11. A __________ contains only one value for the attribute and they don't have multiple numbers of values.

    (a)

    Key Attribute

    (b)

    Simple Attributes

    (c)

    Composite Attributes

    (d)

    Single Valued Attribute

  12. The ________ cannot be separated it will be having a single value for their entity.

    (a)

    Key Attribute

    (b)

    Simple Attributes

    (c)

    Composite Attributes

    (d)

    Single Valued Attribute

  13. A PHP script should start with __________ and end with _________:

    (a)

    < php >

    (b)

    < ? php ? >

    (c)

    < ? ? >

    (d)

    < ?php ? >

  14. What will be the output of the following PHP code?
    < ?php
    \($\) num = 1;
    \($\) num1 = 2;
    print \($\) num . “+”. \($\) num 1 ;
    ? >

    (a)

    3

    (b)

    1 + 2

    (c)

    1.+.2

    (d)

    Error

  15. PHP can embed with _______

    (a)

    HTML

    (b)

    CSS

    (c)

    Javascript

    (d)

    All of the above

  16. We can use ____________ to comment multiple lines?

    (a)

    /?

    (b)

    //

    (c)

    #

    (d)

    /**/

  17. Which one of the following is the right way of defining a function in PHP?

    (a)

    function { function body }

    (b)

    data type functionName(parameters) { function body }

    (c)

    functionName(parameters) { function body }

    (d)

    function fumctionName(parameters) { function body }

  18. Which of the following are correct ways of creating an array?
    i) state[0] = “Tamilnadu”;
    ii) \($\)state[] = array(“Tamilnadu”);
    iii) \($\)state[0] = “Tamilnadu”;
    iv) \($\)state = array(“Tamilnadu”);

    (a)

    iii) and iv)

    (b)

    ii) and iii)

    (c)

    Only i)

    (d)

    ii), iii) and iv)

  19. ______ stores more than one value of same data type in single array variable.

    (a)

    Arrays

    (b)

    Function

    (c)

    Indexed array

    (d)

    Multidimensional array

  20. A _________ array is an array containing one or more arrays.

    (a)

    Associative

    (b)

    Indexed

    (c)

    Multi-dimensional

    (d)

    All of these

  21. What will be the output of the following PHP code ?
    < ?php
    \($\) x = 0;
    if (\($\)x++)
    print “hi”;
    else
    print “how are u”;
    ? >

    (a)

    hi

    (b)

    no output

    (c)

    error

    (d)

    how are u

  22. What will be the output of the following PHP code ?
    < ?php
    \($\)x = 10;
    \($\)y = 20;
    if (\($\)x > \($\)y && 1||1)
    print “hi” ;
    else
    print “how are u”;
    ? >

    (a)

    how are u

    (b)

    hi

    (c)

    error

    (d)

    no output

  23. What will be displayed in a browser when the following PHP code is executed:
    < ?php
    for (\($\)counter = 20; \($\)counter < 10;
    \($\)counter++){
    echo “Welcome to Tamilnadu “;
    }
    echo “Counter is: $counter”;
    ? >

    (a)

    Welcome to Tamilnadu

    (b)

    Counter is: 20

    (c)

    Welcome to Tamilnadu Counter is: 22

    (d)

    Welcome to Tamilnadu Welcome to Tamilnadu Counter is: 22

  24. What will be the output of the following PHP code ?
    < ?php
    for (\($\)x = -1; \($\)x < 10;--\($\)x)
    {
    print \($\)x;
    }
    ? >

    (a)

    123456713910412

    (b)

    123456713910

    (c)

    1234567139104

    (d)

    Infinite loop

  25. The ________ construct provides an easy way to iterate over arrays

    (a)

    foreach

    (b)

    for

    (c)

    while

    (d)

    do..while

  26. Which of the following is an entry check loop?

    (a)

    foreach

    (b)

    for

    (c)

    while

    (d)

    do..while

  27. When you use the \$_GET variable to collect data, the data is visible to..

    (a)

    none

    (b)

    only user

    (c)

    everyone

    (d)

    selected few

  28. What does fopen() function do in PHP?

    (a)

    It used to open files in PHP

    (b)

    It used to open Remote Server

    (c)

    It used to open folders in PHP

    (d)

    It used to open Remote Computer

  29. (A) Check box - (1) Query String
    (B) Email - (2) Client's Request
    (C) POST (3) Should require @ and.strings
    (D) GET - (4) Must be checkable minimum one value

    (a)
    (A) (B) (C) (D)
    3 1 4 2
    (b)
    (A) (B) (C) (D)
    3 4 1 2
    (c)
    (A) (B) (C) (D)
    2 3 4 1
    (d)
    (A) (B) (C) (D)
    4 3 2 1
  30. ________ and ________ are most important concepts that the PHP web development process.

    (a)

    Forms and files

    (b)

    Tables and Links

    (c)

    Both a and b

    (d)

    None of these

  31. Which is the correct function to establish Connection in PHP ?

    (a)

    mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);

    (b)

    connect(“Server Name “,”User Name”,”Password”,”DB Name”);

    (c)

    mysql_connect(“Server Name “,”User Name”,”Password”,”DB Name”);

    (d)

    mysqli_connect (“Database Object”);

  32. How many parameter are required for MYSQLi query function in PHP ?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    5

  33. _______is important to all computer and Internet related applications

    (a)

    Data

    (b)

    MySQL

    (c)

    PHP

    (d)

    None of these

  34. A) DB2 - 1)Open source
    B) SQL SERVER - 2)IBM
    C) MySQL - 3)Microsoft
    D) Oracle - 4)Oracle Corporation
    (a)

    2 3 1 4

    (b)

    4 3 2 1

    (c)

    2 3 4 1

    (d)

    2 4 3 1

  35. _________ helps to predict, manage, and protect the computer network at problems

    (a)

    Artificial intelligence

    (b)

    Broadband provider

    (c)

    Cloud computing

    (d)

    Transceivers

  36. Which one of the following are harmful to computer?

    (a)

    Bloggers

    (b)

    Browser

    (c)

    Hackers

    (d)

    twitter

  37. Memex conceived in the year________

    (a)

    1958

    (b)

    1945

    (c)

    1962

    (d)

    1972

  38. Initial name of host is known as_______

    (a)

    TCP/IP

    (b)

    switch

    (c)

    nodes

    (d)

    CYCLADES

  39. Which of the following system securely share business's information with suppliers, vendors, partners and customers.

    (a)

    Extranet

    (b)

    Intranet

    (c)

    arpanet

    (d)

    arcnet

  40. ________________ refer to other host computers by using names rather than numbers.

    (a)

    DNS

    (b)

    TCP

    (c)

    FTP

    (d)

    SMTP

  41. Second Generation of mobile system were based on _______transmission

    (a)

    Digital

    (b)

    Analog

    (c)

    Both (a) and (b)

    (d)

    None of these

  42. A passive RFID system using_________Method.

    (a)

    EM wave Propagation

    (b)

    Direct

    (c)

    Inductive Coupling

    (d)

    Indirect

  43. Which of the following is used to maintain all the directories of domain names?

    (a)

    Domain name system

    (b)

    Domain name space

    (c)

    Name space

    (d)

    IP address

  44. Which of the following notation is used to denote IPv4 addresses?

    (a)

    Binary

    (b)

    Dotted-decimal

    (c)

    Hexadecimal

    (d)

    a and b

  45. Website were accessed through their________

    (a)

    HTML

    (b)

    URL

    (c)

    domain

    (d)

    IP addresses

  46. Paul V.Mockapetris together with_________ invented the Internet Name System(DNS)

    (a)

    Jon Postel

    (b)

    Dennis Ritchie

    (c)

    James Gostling

    (d)

    carrel lio

  47. Which wiring standard is used for connecting two computers directly?

    (a)

    straight Through wiring

    (b)

    Cross Over wiring

    (c)

    Rollover wiring

    (d)

    None

  48. pick the odd one out from the following cables

    (a)

    roll over

    (b)

    cross over

    (c)

    null modem

    (d)

    straight through

  49. The latest version of USB has the data transfer rate _________ Gbps.

    (a)

    4.85

    (b)

    2.35

    (c)

    3.5

    (d)

    7.5

  50. With the help of _____________ people can access the network from different parts of the world

    (a)

    WWW

    (b)

    HTML

    (c)

    URL

    (d)

    None of these

  51. If the source code of a software is freely accessible by the public, then it is known as

    (a)

    freeware

    (b)

    Firmware

    (c)

    Open source

    (d)

    Public source

  52. Which of the following can document every incident that happened in the simulation and are used for examination?

    (a)

    Net Exam

    (b)

    Network hardware

    (c)

    Trace file

    (d)

    Net document

  53. _______________ software has been developed by a variety of programmers.

    (a)

    Open source

    (b)

    Free Software

    (c)

    Proprietary Software

    (d)

    All of these

  54. Which of the following is not a open source application?

    (a)

    AUDACITY

    (b)

    VLC

    (c)

    Mozila Firefox

    (d)

    MSOffice

  55. G2G systems are classified into

    (a)

    Internal facing and external facing

    (b)

    Internet and Extranet

    (c)

    First wave and Second wave

    (d)

    Left facing and Right facing

  56. ______ host the e-books on their websites.

    (a)

    Bulk-buying sites

    (b)

    Community sites

    (c)

    Digital publishing websites

    (d)

    Licensing websites

  57. _____________ Fusion of television, computer and telecom networking technologies.

    (a)

    Teleputer

    (b)

    Interpreter

    (c)

    cables

    (d)

    modems

  58. The First business to business transaction from _____________

    (a)

    Amazon

    (b)

    e-bav

    (c)

    Thompson Holidays

    (d)

    reddiffshop

  59. Based on the monetary value e payment system can be classified into

    (a)

    Mirco and Macro

    (b)

    Micro and Nano

    (c)

    Maximum and Minimum

    (d)

    Maximum and Macro

  60. Match the following

    List A List B
    A1) First Digit B1) Account number
    A2) 9th to 15th Digit B2) MII Code
    A3) First 6 Digits B3) BIN Code
    A4) Last Digit B4) Check digit
    (a)
    A1 A2 A3 A4
    B4 B3 B2 B1
    (b)
    A1 A2 A3 A4
    B2 B1 B3 B4
    (c)
    A1 A2 A3 A4
    B2 B3 B4 B1
    (d)
    A1 A2 A3 A4
    B2 B4 B3 B1
  61. The term credit card was first mentioned in ________.

    (a)

    1885

    (b)

    1887

    (c)

    1991

    (d)

    1987

  62. Rupay was launched in

    (a)

    2012

    (b)

    2005

    (c)

    2017

    (d)

    2019

  63. __________ protocol is used for securing credit cards transactions via the Internet

    (a)

    Secure Electronic Transaction (SET)

    (b)

    Credit Card Verification

    (c)

    Symmetric Key Encryption

    (d)

    Public Key Encryption

  64. The websites secured by Secure Socket Layer protocols can be identified using

    (a)

    html://

    (b)

    http://

    (c)

    htmls://

    (d)

    https://

  65. ________is a set of protocols that safely guide E-Commerce transactions through the Internet.

    (a)

    E-Commerce security

    (b)

    Tampering

    (c)

    Payment Frauds

    (d)

    Cybersquatting

  66. Typopiracy is variant of__________

    (a)

    Payment Frauds

    (b)

    Tampering

    (c)

    Cybersquatting

    (d)

    All of the above

  67. UNSM stands for

    (a)

    Universal Natural Standard message

    (b)

    Universal Notations for Simple message

    (c)

    United Nations Standard message

    (d)

    United Nations Service message

  68. EDI interchanges starts with _________ and ends with _________

    (a)

    UNA, UNZ

    (b)

    UNB, UNZ

    (c)

    UNA, UNT

    (d)

    UNB, UNT

  69. ________establishes a direct connection between various business stakeholders and partners Individually.

    (a)

    Direct EDI

    (b)

    EDI via VAN

    (c)

    Web EDI

    (d)

    Mobile EDI

*****************************************

Reviews & Comments about 12th Standard Computer Application English Medium All Chapter Book Back and Creative One Mark Questions

Write your Comment