12th Standard Computer Science English Medium Function Important Questions
latest Sample Question Papers
Function Important Questions
12th Standard
Reg.No. :
Computer Science
Time :
01:00:00 Hrs
Total Marks :
60
129 x 1 = 129
The small sections of code that are used to perform a particular task is called
(a)
Subroutines
(b)
Files
(c)
Pseudo code
(d)
Modules
Which of the following is a unit of code that is often defined within a greater code structure?
(a)
Subroutines
(b)
Function
(c)
Files
(d)
Modules
Which of the following is a distinct syntactic block?
(a)
Subroutines
(b)
Function
(c)
Definition
(d)
Modules
The variables in a function definition are called as
(a)
Subroutines
(b)
Function
(c)
Definition
(d)
Parameters
The values which are passed to a function definition are called
(a)
Arguments
(b)
Subroutines
(c)
Function
(d)
Definition
Which of the following are mandatory to write the type annotations in the function definition?
(a)
Curly braces
(b)
Parentheses
(c)
Square brackets
(d)
indentations
Which of the following defines what an object can do?
(a)
Operating System
(b)
Compiler
(c)
Interface
(d)
Interpreter
Which of the following carries out the instructions defined in the interface?
(a)
Operating System
(b)
Compiler
(c)
Implementation
(d)
Interpreter
The functions which will give exact result when same arguments are passed are called
(a)
Impure functions
(b)
Partial Functions
(c)
Dynamic Functions
(d)
Pure functions
The functions which cause side effects to the arguments passed are called
(a)
impure function
(b)
Partial Functions
(c)
Dynamic Functions
(d)
Pure functions
Which of the following are expressed using statements of a programming language?
(a)
Functions
(b)
Algorithm
(c)
Interface
(d)
Implementation
What must the used when a bulk of statements to be repeated for many number of times?
(a)
Algorithm
(b)
Program
(c)
Subroutines
(d)
Parameters
Which of the following contains a set a code that works an many kinds of input and produces a concrete output?
(a)
Function
(b)
Algorithm
(c)
Arguments
(d)
Language
Which of the following are the values which are passed to a function definition?
(a)
Parameters
(b)
Algorithm
(c)
Data types
(d)
Arguments
The function definition is introduced by the keyword
(a)
def
(b)
rec
(c)
let
(d)
infer
The recursive function is defined using the keyword
(a)
let
(b)
let rec
(c)
name
(d)
infer
A function definition which call itself is called
(a)
user defined function
(b)
built-in function
(c)
derived function
(d)
recursive function
Which of the following is a description of all functions in object oriented programming language?
(a)
Implementation
(b)
parameter
(c)
Interface
(d)
Arugument
Which of the following is an instance created from the class?
(a)
parameter
(b)
function
(c)
subroutines
(d)
object
Which of the following is an example of impure function?
(a)
Strlent( )
(b)
randomt( )
(c)
sqrfi( )
(d)
puref( )
In which type of function the return type is solely depends on its argument passed?
(a)
pure
(b)
impure
(c)
parameterized
(d)
monochromatize
In which type of function the return type does not solely depends on its argument passed?
(a)
Pure
(b)
Parameterized
(c)
Impure
(d)
Monochromatize
Subroutines are called as________
(a)
Algorithm
(b)
Interface
(c)
Parameters
(d)
Function
_______are the variables in a function definition.
(a)
Arguments
(b)
Parameters
(c)
Identifiers
(d)
Operators
Explicitly_________the types can help with debugging.
(a)
defining
(b)
annotating
(c)
informing
(d)
computing
All functions are________ definitions.
(a)
static
(b)
dynamic
(c)
algorithmic
(d)
static
A_________ combines the external interface with an implementation of the interface
(a)
parameter without type
(b)
class declaration
(c)
function definition
(d)
parameter with type
In object oriented programs__________ are the interface
(a)
Implementation
(b)
parameters
(c)
Interface
(d)
Arguments
In object oriented programs, how the object is processed and executed is__________
(a)
Implementation
(b)
Interface
(c)
recursion
(d)
function
Strlen is an example________function.
(a)
user defined
(b)
impure
(c)
pure
(d)
recursive
Evaluation of__________ functions does not cause any side effects to its output?
(a)
Impure
(b)
pure
(c)
Recursive
(d)
built-in
Which of the following functions that build the abstract data type?
(a)
Constructors
(b)
Destructors
(c)
recursive
(d)
Nested
Which of the following functions that retrieve information from the data type?
(a)
Constructors
(b)
Selectors
(c)
recursive
(d)
Nested
The data structure which is a mutable ordered sequence of elements is called
(a)
Built in
(b)
List
(c)
Tuple
(d)
Derived data
A sequence of immutable objects is called
(a)
Built in
(b)
List
(c)
Tuple
(d)
Derived data
The data type whose representation is known are called
(a)
Built in datatype
(b)
Derived datatype
(c)
Concrete datatype
(d)
Abstract datatype
The data type whose representation is unknown are called
(a)
Built in datatype
(b)
Derived datatype
(c)
Concrete datatype
(d)
Abstract datatype
Which of the following is a compound structure?
(a)
Pair
(b)
Triplet
(c)
single
(d)
quadrat
Bundling two values together into one can be considered as
(a)
Pair
(b)
Triplet
(c)
single
(d)
quadrat
Which of the following allow to name the various parts of a multi-item object?
(a)
Tuples
(b)
Lists
(c)
Classes
(d)
quadrats
Which of the following is constructed by placing expressions within square brackets?
(a)
Tuples
(b)
Lists
(c)
Classes
(d)
quadrats
Which of the following is a powerful concept that allows programmers to treat codes as objects?
(a)
Encapsulation
(b)
Data Abstraction
(c)
Inheritance
(d)
Polymorphism
Which of the following provides modularity?
(a)
Datatypes
(b)
Subroutines
(c)
Classes
(d)
Abstraction
ADT expansion is
(a)
Abstract Data Template
(b)
Absolute Data Type
(c)
Abstract Data Type
(d)
Application Development Tool
Which of the following is a type for objects whose behavior is defined by a set of value and a set of operations?
(a)
User-defined datatype
(b)
Derived datatype
(c)
Built-in datatype
(d)
Abstract datatype
ADT behavior is defined by
(i) Set of Variables
(ii) Set of Value
(iii) Set of Functions
(iv) Set of Operations
(a)
i, ii
(b)
ii, iii
(c)
ii, iv
(d)
i, iii
The process of providing only the essentials and hiding the details is known as
(a)
Functions
(b)
Abstraction
(c)
Encapsulation
(d)
Pairs
Which of the following gives an implementation independent view?
(a)
Abstract
(b)
Concrete
(c)
Datatype
(d)
Behavior of an object
How many ways to implement an ADT?
(a)
Only one
(b)
Two
(c)
Three
(d)
Many
Which of the following are implemented using & lists?
(a)
Singly linked list ADT
(b)
Doubly Linked list ADT
(c)
Queue ADT
(d)
All of these
Which of the following replicate how we think about the world?
(a)
Queue ADT
(b)
Data Hiding
(c)
Data Abstraction
(d)
Stack ADT
To facilitate data abstraction, How many types of functions are created?
(a)
2
(b)
3
(c)
4
(d)
Only one
Which of the following function that facilitate the data abstraction?
(a)
Constructors
(b)
Destructors
(c)
Selectors
(d)
a and c
Which of the following are functions that build the abstract datatypet?
(a)
Constructors
(b)
Destructors
(c)
Selectors
(d)
All of these
Which of the following extract the information of the object?
(a)
Constructors
(b)
Functions
(c)
Selectors
(d)
Destructors
In which data representation, a definition for each function is known
(a)
User defined
(b)
Buil-in
(c)
Abstract
(d)
Concrete
How many parts are the!"ein the program?
(a)
2
(b)
3
(c)
4
(d)
Many
To implement the concrete level of data abstraction the language python provides a compound structure called
(a)
ADT
(b)
Concrete data
(c)
Pair
(d)
User defined function
Which of the following is contracted by placing expressions within square brackets separated by commas?
(a)
List
(b)
Tuple
(c)
Set
(d)
Dictionary
How many values can be stared in the list?
(a)
4
(b)
10
(c)
100
(d)
Multiple
List can also be called as
(a)
Functions
(b)
Class
(c)
Structure
(d)
Pairs
How many ways are there to represent pair datatypet?
(a)
2
(b)
4
(c)
3
(d)
5
Color = ('red', 'green, 'blue') is an example of
(a)
Dictionary
(b)
List
(c)
Set
(d)
Tuple
Which of the following does not allow us to name the various parts of a multi-item object?
(a)
List
(b)
Triple
(c)
Pair
(d)
All of these
Which of the following defines a data abstraction by grouping related data items?
(a)
List
(b)
Pair
(c)
Class
(d)
Tuple
Which of the following as bundled data and the functions that work on that data?
(a)
Object
(b)
Pair
(c)
List
(d)
Class
I: = [10,20] is an example
(a)
Tuple
(b)
Set
(c)
List
(d)
Dictionary
CDT expansion is
(a)
Collective Data Type
(b)
Class Data Type
(c)
Concrete Data Type
(d)
Central Data Type
Data Abstraction allows programmers to treat code as_______
(a)
Objects
(b)
Classes
(c)
Members
(d)
Parameters
________are the representation for Abstract Data types.
(a)
Objects
(b)
Classes
(c)
Functions
(d)
Lists
Classes are the representation for___________
(a)
Abstract datatype
(b)
Built-in datatype
(c)
Concrete datatype
(d)
Essential datatype
The____________ can be implemented using singly linked list or doubly linked list
(a)
Tuple ADT
(b)
List ADT
(c)
Function ADT
(d)
List ADT
The basic idea of ________ is to structure programs so that they operate on abstract dat(a)
(a)
Encapsulation
(b)
Polymorphism
(c)
Data type
(d)
Data Abstraction
A________ data representation is defined as an independent part of the program.
(a)
Abstract
(b)
Concrete
(c)
List
(d)
Tuple
______ are functions that retrieve information from the data type.
(a)
Constructors
(b)
Selectors
(c)
List
(d)
Tuple
______is made up of list or Tuples
(a)
Set
(b)
Pair
(c)
Dictionary
(d)
Control Structures
A ________ is a comma separated values surround with parentheses.
(a)
List
(b)
Tuple
(c)
Set
(d)
Dictionary
Tuple is constructed by using ______ and________
(a)
( )
(b)
[ ]
(c)
<>
(d)
{}
A________ is not just data, it has functions defined within it.
(a)
Class
(b)
List
(c)
Pair
(d)
Object
List is constructed by using ________ and _________.
(a)
( ), ,
(b)
< >,;
(c)
[ ], ,
(d)
[ ],:
Which of the following refers to the visibility of variablesin one part of a program to another part of the same program.
(a)
Scope
(b)
Memory
(c)
Address
(d)
Accessibility
The process of binding a variable name with an object is called
(a)
Scope
(b)
Mapping
(c)
late binding
(d)
early binding
Which of the following is used in programming languages to map the variable and object?
(a)
::
(b)
:=
(c)
=
(d)
==
Containers for mapping names of variables to objects is called
(a)
Scope
(b)
Mapping
(c)
Binding
(d)
Namespaces
Which scope refers to variables defined in current function?
(a)
Local Scope
(b)
Global scope
(c)
Module scope
(d)
Function Scope
The process of subdividing a computer program into separate sub-programs is called
(a)
Procedural Programming
(b)
Modular programming
(c)
Event Driven Programming
(d)
Object oriented Programming
Which of the following security technique that regulates who canuse resources in a computing environment?
(a)
Password
(b)
Authentication
(c)
Access control
(d)
Certification
Which of the following members of a class can be handled only from within the class?
(a)
Public members
(b)
Protected members
(c)
Secured members
(d)
Private members
Which members are accessible from outside the class?
(a)
Public members
(b)
Protected members
(c)
Secured members
(d)
Private members
The members that are accessible from within the class and are also available to its sub classes is called
(a)
Public members
(b)
Protected members
(c)
Secured members
(d)
Private members
The part of a program that can see or use the variables are called
(a)
Scope
(b)
Parameter
(c)
Function
(d)
Indentation
Which of the following refers to the addresses to an object in memory?
(a)
Functions
(b)
Indentation
(c)
Variables
(d)
Operators
How many variables can be mapped to the same instance?
(a)
2
(b)
3
(c)
4
(d)
Multiple
Which of the following keeps track of all these mappings with namespaces?
(a)
Programming languages
(b)
Application software
(c)
System software
(d)
MySQL
How the names are mapped with objects in programming language?
(a)
name == object
(b)
name:: object
(c)
name:= object
(d)
object:= name
The order in which variables have to be mapped to the object in order to obtain the value is called
(a)
Rule
(b)
Syntax
(c)
Scope
(d)
Hierarchy
Which of the following rule is used to decide the order in which the scopes are to be searched for scope resolution?
(a)
LEGB
(b)
LGEB
(c)
LBEG
(d)
LGBE
Write the below interns of hierarchy (highest to lowest)?
(1) Reversed names in built in functions
(2) Defined inside function
(3) Defined inside enclosing function
(4) Defined at the uppermost level
(a)
3,2,1,4
(b)
1,4,2,3
(c)
2,3, 1,4
(d)
2,3,4, 1
How many types of variable scope are there?
(a)
2
(b)
4
(c)
3
(d)
6
Which of the following is not a variable scope?
(a)
Global
(b)
Enclosed
(c)
List
(d)
Built-in
Choose the type of scope for a variable '9! defined in the following program.
Disp ( ):
a:=7
Print a
Disp ( )
(a)
Global
(b)
Enclosed
(c)
Local
(d)
Built-in
A variable which is declared outside all the functions in a program is known as
(a)
Local
(b)
Enclosed
(c)
Extern
(d)
Global
Which of the following variable can be accessed inside or outside of all the functions in a program?
(a)
Local
(b)
Global
(c)
Enclosed
(d)
Built-in
What is the output of the statement in the following program?
X:=10
Disp ( ):
a:=7
print a
Disp ( ) :
Print a
(a)
710
(b)
107
(c)
7
(d)
10
Which of the following can ease the job of programming and debugging the program?
(a)
Statements
(b)
Interaction
(c)
Modules
(d)
Scopes
Which of the following programming enables programmers to divide up the work and retry pieces of the program independently?
(a)
Modular Programming
(b)
Procedural Programming
(c)
Object Oriented Programming
(d)
Structural Programming
The example of modules are
(a)
Procedures
(b)
Subroutines
(c)
Functions
(d)
All of these
Which of the following contain instructions, processing logic and data?
(a)
Scopes
(b)
Modules
(c)
Indentation
(d)
Access control
The following are the type of variable scopes Find the odd one out
(a)
Local
(b)
Enclosed
(c)
Global
(d)
Protected
Which of the following members of a class are denied access from outside the class?
(a)
Private
(b)
Protected
(c)
Public
(d)
Enclosed
Which of the following is not a classical object oriented language
(a)
C++
(b)
Java
(c)
Python
(d)
C
Which of the following keywords are not used to control the access to class members?
(a)
Public
(b)
Protected
(c)
Public
(d)
Global
How many access control keywords are there?
(a)
2
(b)
3
(c)
4
(d)
6
Find the odd man out
(a)
Public
(b)
Local
(c)
Protected
(d)
Private
The arrangement of private instance variables and public methods ensure the principle of
(a)
Inheritance
(b)
Polymorphism
(c)
Encapsulation
(d)
Abstraction
Which of the following members of a class are accessible from within the class and available to its subclass?
(a)
Private
(b)
Protected
(c)
Public
(d)
All of these
By default, the Python. class members are
(a)
Private
(b)
Protected
(c)
Global
(d)
Public
By default, the C++ and Java class members are
(a)
Private
(b)
Protected
(c)
Public
(d)
Local
Programs are composed of one or more independently developed
(a)
Access control
(b)
Encapsulatio
(c)
Modules
(d)
Members of a class
Scope refers to the visibility of___________.
(a)
Variables
(b)
Parameters
(c)
Functions
(d)
All of these
Fill up the blank in assign a variable with________to an object.
(a)
=
(b)
! =
(c)
: =
(d)
= =
The duration for which a variable is alive is called its_______
(a)
End time
(b)
Life time
(c)
Scope time
(d)
Visible time
The scope of a_______ is that part of the code where it is visible
(a)
Keyword
(b)
Variable
(c)
Function
(d)
Operator
A Function always first look up for a variable name in its______ scope
(a)
Local
(b)
Enclosed
(c)
Global
(d)
Built-in
The inner function can access the variable of the outer function. This is called________scope.
(a)
Local
(b)
Function
(c)
Enclosed
(d)
Global
______can be separately compiled and stored in a library
(a)
Characteristics
(b)
Syntax
(c)
Modules
(d)
none of these
In Object Oriented Programming Language security is implanted through_______
(a)
Access modifiers
(b)
Access modules
(c)
Access variables
(d)
Keywords
___________is a selective restriction of access to data in a program?
(a)
Control variable
(b)
System authentication
(c)
Access control
(d)
Module
_________members of the class are accessible from outside the class
(a)
Private
(b)
Privated
(c)
Public
(d)
All of these
*****************************************
Tags:
12th Standard Computer Science English Medium Function Important Questions
Related
12th Standard Computer Science Subject Materials