New ! Computer Science MCQ Practise Tests



Function Important Questions

12th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Science

Time : 01:00:00 Hrs
Total Marks : 60
    129 x 1 = 129
  1. The small sections of code that are used to perform a particular task is called

    (a)

    Subroutines

    (b)

    Files

    (c)

    Pseudo code

    (d)

    Modules

  2. Which of the following is a unit of code that is often defined within a greater code structure?

    (a)

    Subroutines

    (b)

    Function

    (c)

    Files

    (d)

    Modules

  3. Which of the following is a distinct syntactic block?

    (a)

    Subroutines

    (b)

    Function

    (c)

    Definition

    (d)

    Modules

  4. The variables in a function definition are called as

    (a)

    Subroutines

    (b)

    Function

    (c)

    Definition

    (d)

    Parameters

  5. The values which are passed to a function definition are called

    (a)

    Arguments

    (b)

    Subroutines

    (c)

    Function

    (d)

    Definition

  6. Which of the following are mandatory to write the type annotations in the function definition?

    (a)

    { }

    (b)

    ( )

    (c)

    [ ]

    (d)

    < >

  7. Which of the following defines what an object can do?

    (a)

    Operating System

    (b)

    Compiler

    (c)

    Interface

    (d)

    Interpreter

  8. Which of the following carries out the instructions defined in the interface?

    (a)

    Operating System

    (b)

    Compiler

    (c)

    Implementation

    (d)

    Interpreter

  9. The functions which will give exact result when same arguments are passed are called

    (a)

    Impure functions

    (b)

    Partial Functions

    (c)

    Dynamic Functions

    (d)

    Pure functions

  10. The functions which cause side effects to the arguments passed are called

    (a)

    Impure function

    (b)

    Partial Functions

    (c)

    Dynamic Functions

    (d)

    Pure functions

  11. Which of the following are expressed using statements of a programming language?

    (a)

    Functions

    (b)

    Algorithm

    (c)

    Interface

    (d)

    Implementation

  12. What must the used when a bulk of statements to be repeated for many number of times?

    (a)

    Algorithm

    (b)

    Program

    (c)

    Subroutines

    (d)

    Parameters

  13. Which of the following contains a set a code that works an many kinds of input and produces a concrete output?

    (a)

    Function

    (b)

    Algorithm

    (c)

    Arguments

    (d)

    Language

  14. Which of the following are the values which are passed to a function definition?

    (a)

    Parameters

    (b)

    Algorithm

    (c)

    Data types

    (d)

    Arguments

  15. The function definition is introduced by the keyword

    (a)

    def

    (b)

    rec

    (c)

    let

    (d)

    infer

  16. The recursive function is defined using the keyword

    (a)

    let

    (b)

    let rec

    (c)

    name

    (d)

    infer

  17. A function definition which call itself is called

    (a)

    user defined function

    (b)

    built-in function

    (c)

    derived function

    (d)

    recursive function

  18. Which of the following is a description of all functions in object oriented programming language?

    (a)

    Implementation

    (b)

    parameter

    (c)

    Interface

    (d)

    Arugument

  19. Which of the following is an instance created from the class?

    (a)

    parameter

    (b)

    function

    (c)

    subroutines

    (d)

    object

  20. Which of the following is an example of impure function?

    (a)

    Strlent( )

    (b)

    randomt( )

    (c)

    sqrfi( )

    (d)

    puref( )

  21. In which type of function the return type is solely depends on its argument passed?

    (a)

    pure

    (b)

    impure

    (c)

    parameterized

    (d)

    monochromatize

  22. In which type of function the return type does not solely depends on its argument passed?

    (a)

    Pure

    (b)

    Parameterized

    (c)

    Impure

    (d)

    Monochromatize

  23. Subroutines are called as________

    (a)

    Algorithm

    (b)

    Interface

    (c)

    Parameters

    (d)

    Function

  24. _______are the variables in a function definition.

    (a)

    Arguments

    (b)

    Parameters

    (c)

    Identifiers

    (d)

    Operators

  25. Explicitly_________the types can help with debugging.

    (a)

    defining

    (b)

    annotating

    (c)

    informing

    (d)

    computing

  26. All functions are________ definitions.

    (a)

    static

    (b)

    dynamic

    (c)

    algorithmic

    (d)

    static

  27. A_________ combines the external interface with an implementation of the interface

    (a)

    parameter without type

    (b)

    class declaration

    (c)

    function definition

    (d)

    parameter with type

  28. In object oriented programs__________ are the interface

    (a)

    Implementation

    (b)

    parameters

    (c)

    Interface

    (d)

    Arguments

  29. In object oriented programs, how the object is processed and executed is__________

    (a)

    Implementation

    (b)

    Interface

    (c)

    recursion

    (d)

    function

  30. Strlen is an example________function.

    (a)

    user defined

    (b)

    impure

    (c)

    pure

    (d)

    recursive

  31. Evaluation of__________ functions does not cause any side effects to its output?

    (a)

    Impure

    (b)

    pure

    (c)

    Recursive

    (d)

    built-in

  32. Which of the following functions that build the abstract data type?

    (a)

    Constructors

    (b)

    Destructors

    (c)

    recursive

    (d)

    Nested

  33. Which of the following functions that retrieve information from the data type?

    (a)

    Constructors

    (b)

    Selectors

    (c)

    recursive

    (d)

    Nested

  34. The data structure which is a mutable ordered sequence of elements is called

    (a)

    Built in

    (b)

    List

    (c)

    Tuple

    (d)

    Derived data

  35. A sequence of immutable objects is called

    (a)

    Built in

    (b)

    List

    (c)

    Tuple

    (d)

    Derived data

  36. The data type whose representation is known are called

    (a)

    Built in datatype

    (b)

    Derived datatype

    (c)

    Concrete datatype

    (d)

    Abstract datatype

  37. The data type whose representation is unknown are called

    (a)

    Built in datatype

    (b)

    Derived datatype

    (c)

    Concrete datatype

    (d)

    Abstract datatype

  38. Which of the following is a compound structure?

    (a)

    Pair

    (b)

    Triplet

    (c)

    single

    (d)

    quadrat

  39. Bundling two values together into one can be considered as

    (a)

    Pair

    (b)

    Triplet

    (c)

    single

    (d)

    quadrat

  40. Which of the following allow to name the various parts of a multi-item object?

    (a)

    Tuples

    (b)

    Lists

    (c)

    Classes

    (d)

    quadrats

  41. Which of the following is constructed by placing expressions within square brackets?

    (a)

    Tuples

    (b)

    Lists

    (c)

    Classes

    (d)

    quadrats

  42. Which of the following is a powerful concept that allows programmers to treat codes as objects?

    (a)

    Encapsulation

    (b)

    Data Abstraction

    (c)

    Inheritance

    (d)

    Polymorphism

  43. Which of the following provides modularity?

    (a)

    Datatypes

    (b)

    Subroutines

    (c)

    Classes

    (d)

    Abstraction

  44. ADT expansion is

    (a)

    Abstract Data Template

    (b)

    Absolute Data Type

    (c)

    Abstract Data Type

    (d)

    Application Development Tool

  45. Which of the following is a type for objects whose behavior is defined by a set of value and a set of operations?

    (a)

    User-defined datatype

    (b)

    Derived datatype

    (c)

    Built-in datatype

    (d)

    Abstract datatype

  46. ADT behavior is defined by
    (i) Set of Variables
    (ii) Set of Value
    (iii) Set of Functions
    (iv) Set of Operations

    (a)

    i, ii

    (b)

    ii, iii

    (c)

    ii, iv

    (d)

    i, iii

  47. The process of providing only the essentials and hiding the details is known as

    (a)

    Functions

    (b)

    Abstraction

    (c)

    Encapsulation

    (d)

    Pairs

  48. Which of the following gives an implementation independent view?

    (a)

    Abstract

    (b)

    Concrete

    (c)

    Datatype

    (d)

    Behavior of an object

  49. How many ways to implement an ADT?

    (a)

    Only one

    (b)

    Two

    (c)

    Three

    (d)

    Many

  50. Which of the following are implemented using & lists?

    (a)

    Singly linked list ADT

    (b)

    Doubly Linked list ADT

    (c)

    Queue ADT

    (d)

    All of these

  51. Which of the following replicate how we think about the world?

    (a)

    Queue ADT

    (b)

    Data Hiding

    (c)

    Data Abstraction

    (d)

    Stack ADT

  52. To facilitate data abstraction, How many types of functions are created?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    Only one

  53. Which of the following function that facilitate the data abstraction?

    (a)

    Constructors

    (b)

    Destructors

    (c)

    Selectors

    (d)

    a and c

  54. Which of the following are functions that build the abstract datatypet?

    (a)

    Constructors

    (b)

    Destructors

    (c)

    Selectors

    (d)

    All of these

  55. Which of the following extract the information of the object?

    (a)

    Constructors

    (b)

    Functions

    (c)

    Selectors

    (d)

    Destructors

  56. In which data representation, a definition for each function is known

    (a)

    User defined

    (b)

    Buil-in

    (c)

    Abstract

    (d)

    Concrete

  57. How many parts are the!"ein the program?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    Many

  58. To implement the concrete level of data abstraction the language python provides a compound structure called

    (a)

    ADT

    (b)

    Concrete data

    (c)

    Pair

    (d)

    User defined function

  59. Which of the following is contracted by placing expressions within square brackets separated by commas?

    (a)

    List

    (b)

    Tuple

    (c)

    Set

    (d)

    Dictionary

  60. How many values can be stared in the list?

    (a)

    4

    (b)

    10

    (c)

    100

    (d)

    Multiple

  61. List can also be called as

    (a)

    Functions

    (b)

    Class

    (c)

    Structure

    (d)

    Pairs

  62. How many ways are there to represent pair datatypet?

    (a)

    2

    (b)

    4

    (c)

    3

    (d)

    5

  63. Color = ('red', 'green, 'blue') is an example of

    (a)

    Dictionary

    (b)

    List

    (c)

    Set

    (d)

    Tuple

  64. Which of the following does not allow us to name the various parts of a multi-item object?

    (a)

    List

    (b)

    Triple

    (c)

    Pair

    (d)

    All of these

  65. Which of the following defines a data abstraction by grouping related data items?

    (a)

    List

    (b)

    Pair

    (c)

    Class

    (d)

    Tuple

  66. Which of the following as bundled data and the functions that work on that data?

    (a)

    Object

    (b)

    Pair

    (c)

    List

    (d)

    Class

  67. I: = [10,20] is an example

    (a)

    Tuple

    (b)

    Set

    (c)

    List

    (d)

    Dictionary

  68. CDT expansion is

    (a)

    Collective Data Type

    (b)

    Class Data Type

    (c)

    Concrete Data Type

    (d)

    Central Data Type

  69. Data Abstraction allows programmers to treat code as_______

    (a)

    Objects

    (b)

    Classes

    (c)

    Members

    (d)

    Parameters

  70. ________are the representation for Abstract Data types.

    (a)

    Objects

    (b)

    Classes

    (c)

    Functions

    (d)

    Lists

  71. Classes are the representation for___________

    (a)

    Abstract datatype

    (b)

    Built-in datatype

    (c)

    Concrete datatype

    (d)

    Essential datatype

  72. The____________ can be implemented using singly linked list or doubly linked list

    (a)

    Tuple ADT

    (b)

    List ADT

    (c)

    Function ADT

    (d)

    List ADT

  73. The basic idea of ________ is to structure programs so that they operate on abstract dat(a)

    (a)

    Encapsulation

    (b)

    Polymorphism

    (c)

    Data type

    (d)

    Data Abstraction

  74. A________ data representation is defined as an independent part of the program.

    (a)

    Abstract

    (b)

    Concrete

    (c)

    List

    (d)

    Tuple

  75. ______ are functions that retrieve information from the data type.

    (a)

    Constructors

    (b)

    Selectors

    (c)

    List

    (d)

    Tuple

  76. ______is made up of list or Tuples

    (a)

    Set

    (b)

    Pair

    (c)

    Dictionary

    (d)

    Control Structures

  77. A ________ is a comma separated values surround with parentheses.

    (a)

    List

    (b)

    Tuple

    (c)

    Set

    (d)

    Dictionary

  78. Tuple is constructed by using ______ and________

    (a)

    ( )

    (b)

    [ ]

    (c)

    <>

    (d)

    {}

  79. A________ is not just data, it has functions defined within it.

    (a)

    Class

    (b)

    List

    (c)

    Pair

    (d)

    Object

  80. List is constructed by using ________ and _________.

    (a)

    ( ), ,

    (b)

    < >,;

    (c)

    [ ], ,

    (d)

    [ ],:

  81. Which of the following refers to the visibility of variablesin one part of a program to another part of the same program.

    (a)

    Scope

    (b)

    Memory

    (c)

    Address

    (d)

    Accessibility

  82. The process of binding a variable name with an object is called

    (a)

    Scope

    (b)

    Mapping

    (c)

    late binding

    (d)

    early binding

  83. Which of the following is used in programming languages to map the variable and object?

    (a)

    ::

    (b)

    :=

    (c)

    =

    (d)

    ==

  84. Containers for mapping names of variables to objects is called

    (a)

    Scope

    (b)

    Mapping

    (c)

    Binding

    (d)

    Namespaces

  85. Which scope refers to variables defined in current function?

    (a)

    Local Scope

    (b)

    Global scope

    (c)

    Module scope

    (d)

    Function Scope

  86. The process of subdividing a computer program into separate sub-programs is called

    (a)

    Procedural Programming

    (b)

    Modular programming

    (c)

    Event Driven Programming

    (d)

    Object oriented Programming

  87. Which of the following security technique that regulates who can use resources in a computing environment?

    (a)

    Password

    (b)

    Authentication

    (c)

    Access control

    (d)

    Certification

  88. Which of the following members of a class can be handled only from within the class?

    (a)

    Public members

    (b)

    Protected members

    (c)

    Secured members

    (d)

    Private members

  89. Which members are accessible from outside the class?

    (a)

    Public members

    (b)

    Protected members

    (c)

    Secured members

    (d)

    Private members

  90. The members that are accessible from within the class and are also available to its sub classes is called

    (a)

    Public members

    (b)

    Protected members

    (c)

    Secured members

    (d)

    Private members

  91. The part of a program that can see or use the variables are called

    (a)

    Scope

    (b)

    Parameter

    (c)

    Function

    (d)

    Indentation

  92. Which of the following refers to the addresses to an object in memory?

    (a)

    Functions

    (b)

    Indentation

    (c)

    Variables

    (d)

    Operators

  93. How many variables can be mapped to the same instance?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    Multiple

  94. Which of the following keeps track of all these mappings with namespaces?

    (a)

    Programming languages

    (b)

    Application software

    (c)

    System software

    (d)

    MySQL

  95. How the names are mapped with objects in programming language?

    (a)

    name == object

    (b)

    name:: object

    (c)

    name:= object

    (d)

    object:= name

  96. The order in which variables have to be mapped to the object in order to obtain the value is called

    (a)

    Rule

    (b)

    Syntax

    (c)

    Scope

    (d)

    Hierarchy

  97. Which of the following rule is used to decide the order in which the scopes are to be searched for scope resolution?

    (a)

    LEGB

    (b)

    LGEB

    (c)

    LBEG

    (d)

    LGBE

  98. Write the below interns of hierarchy (highest to lowest)?
    (1) Reversed names in built in functions
    (2) Defined inside function
    (3) Defined inside enclosing function
    (4) Defined at the uppermost level

    (a)

    3,2,1,4

    (b)

    1,4,2,3

    (c)

    2,3, 1,4

    (d)

    2,3,4, 1

  99. How many types of variable scope are there?

    (a)

    2

    (b)

    4

    (c)

    3

    (d)

    6

  100. Which of the following is not a variable scope?

    (a)

    Global

    (b)

    Enclosed

    (c)

    List

    (d)

    Built-in

  101. Choose the type of scope for a variable '9! defined in the following program.
    Disp ( ):
    a:=7
    Print a
    Disp ( )

    (a)

    Global

    (b)

    Enclosed

    (c)

    Local

    (d)

    Built-in

  102. A variable which is declared outside all the functions in a program is known as

    (a)

    Local

    (b)

    Enclosed

    (c)

    Extern

    (d)

    Global

  103. Which of the following variable can be accessed inside or outside of all the functions in a program?

    (a)

    Local

    (b)

    Global

    (c)

    Enclosed

    (d)

    Built-in

  104. What is the output of the statement in the following program?
    X:=10
    Disp ( ):
    a:=7
    print a
    Disp ( ) :
    Print a

    (a)

    710

    (b)

    107

    (c)

    7

    (d)

    10

  105. Which of the following can ease the job of programming and debugging the program?

    (a)

    Statements

    (b)

    Interaction

    (c)

    Modules

    (d)

    Scopes

  106. Which of the following programming enables programmers to divide up the work and retry pieces of the program independently?

    (a)

    Modular Programming

    (b)

    Procedural Programming

    (c)

    Object Oriented Programming

    (d)

    Structural Programming

  107. The example of modules are

    (a)

    Procedures

    (b)

    Subroutines

    (c)

    Functions

    (d)

    All of these

  108. Which of the following contain instructions, processing logic and data?

    (a)

    Scopes

    (b)

    Modules

    (c)

    Indentation

    (d)

    Access control

  109. The following are the type of variable scopes Find the odd one out

    (a)

    Local

    (b)

    Enclosed

    (c)

    Global

    (d)

    Protected

  110. Which of the following members of a class are denied access from outside the class?

    (a)

    Private

    (b)

    Protected

    (c)

    Public

    (d)

    Enclosed

  111. Which of the following is not a classical object oriented language

    (a)

    C++

    (b)

    Java

    (c)

    Python

    (d)

    C

  112. Which of the following keywords are not used to control the access to class members?

    (a)

    Public

    (b)

    Protected

    (c)

    Public

    (d)

    Global

  113. How many access control keywords are there?

    (a)

    2

    (b)

    3

    (c)

    4

    (d)

    6

  114. Find the odd man out

    (a)

    Public

    (b)

    Local

    (c)

    Protected

    (d)

    Private

  115. The arrangement of private instance variables and public methods ensure the principle of

    (a)

    Inheritance

    (b)

    Polymorphism

    (c)

    Encapsulation

    (d)

    Abstraction

  116. Which of the following members of a class are accessible from within the class and available to its subclass?

    (a)

    Private

    (b)

    Protected

    (c)

    Public

    (d)

    All of these

  117. By default, the Python. class members are

    (a)

    Private

    (b)

    Protected

    (c)

    Global

    (d)

    Public

  118. By default, the C++ and Java class members are

    (a)

    Private

    (b)

    Protected

    (c)

    Public

    (d)

    Local

  119. Programs are composed of one or more independently developed

    (a)

    Access control

    (b)

    Encapsulatio

    (c)

    Modules

    (d)

    Members of a class

  120. Scope refers to the visibility of___________.

    (a)

    Variables

    (b)

    Parameters

    (c)

    Functions

    (d)

    All of these

  121. Fill up the blank in assign a variable with________to an object.

    (a)

    =

    (b)

    ! =

    (c)

    : =

    (d)

    = =

  122. The duration for which a variable is alive is called its_______

    (a)

    End time

    (b)

    Life time

    (c)

    Scope time

    (d)

    Visible time

  123. The scope of a_______ is that part of the code where it is visible

    (a)

    Keyword

    (b)

    Variable

    (c)

    Function

    (d)

    Operator

  124. A Function always first look up for a variable name in its______ scope

    (a)

    Local

    (b)

    Enclosed

    (c)

    Global

    (d)

    Built-in

  125. The inner function can access the variable of the outer function. This is called________scope.

    (a)

    Local

    (b)

    Function

    (c)

    Enclosed

    (d)

    Global

  126. ______can be separately compiled and stored in a library

    (a)

    Characteristics

    (b)

    Syntax

    (c)

    Modules

    (d)

    none of these

  127. In Object Oriented Programming Language security is implanted through_______

    (a)

    Access modifiers

    (b)

    Access modules

    (c)

    Access variables

    (d)

    Keywords

  128. ___________is a selective restriction of access to data in a program?

    (a)

    Control variable

    (b)

    System authentication

    (c)

    Access control

    (d)

    Module

  129. _________members of the class are accessible from outside the class

    (a)

    Private

    (b)

    Privated

    (c)

    Public

    (d)

    All of these

*****************************************

Reviews & Comments about 12th Standard Computer Science English Medium Function Important Questions updated Sample Question Papers

Write your Comment