Type Here to Get Search Results !

Jeca 2025 full mock test 8


📘 সিলেবাস টপিকস:
✅ C Programming
✅ Object Oriented Programming (OOP)
✅ UNIX
✅ Data Structures
✅ Operating System
✅ DBMS
✅ Computer Networks
✅ Software Engineering
✅ Machine Learning


---

✅ WBJEE JECA – Computer Applications – Mock Test 8 (50 MCQs with Answers)



🔵 C Programming

1. The format specifier %x is used to print:
a. Octal
b. Hexadecimal
c. Decimal
d. Float
Answer: b


2. Which function is used to read formatted input?
a. printf()
b. scanf()
c. gets()
d. puts()
Answer: b


3. What is the output of 5 % 2?
a. 1
b. 2
c. 2.5
d. 0
Answer: a


4. Arrays in C are:
a. Dynamic
b. Static
c. Sorted
d. Global
Answer: b


5. A pointer is used to store:
a. Character
b. Address
c. Integer
d. String
Answer: b




---

🟢 Object Oriented Programming

6. Which keyword is used for inheritance in C++?
a. extends
b. implements
c. inherits
d. : (colon)
Answer: d


7. Encapsulation is implemented using:
a. Global variables
b. Classes
c. Functions
d. Loops
Answer: b


8. Which of the following allows a function to behave differently based on input?
a. Overriding
b. Overloading
c. Abstraction
d. Inheritance
Answer: b


9. Which function is called automatically when an object is destroyed?
a. constructor
b. destructor
c. friend function
d. operator function
Answer: b


10. this pointer refers to:
a. Base class
b. Current object
c. Derived object
d. Friend class
Answer: b




---

🟡 UNIX

11. The ps command is used to:
a. Change permissions
b. Kill process
c. Show running processes
d. Print file
Answer: c


12. Which symbol is used for redirecting output to a file?
a. |
b. >
c. &
d. *
Answer: b


13. Which command lists hidden files too?
a. ls
b. ls -a
c. ls -h
d. list
Answer: b


14. Shell script is written in:
a. Python
b. Java
c. Shell
d. Bash
Answer: d


15. Which command is used to search for a pattern in a file?
a. find
b. locate
c. grep
d. wc
Answer: c




---

🔴 Data Structures

16. A binary search tree has:
a. Sorted structure
b. Random nodes
c. No structure
d. Circular logic
Answer: a


17. Insertion in a stack happens at:
a. Bottom
b. Middle
c. Top
d. Anywhere
Answer: c


18. Queue is used in:
a. DFS
b. BFS
c. Stack
d. Sorting
Answer: b


19. Stack follows:
a. LIFO
b. FIFO
c. FILO
d. Random
Answer: a


20. Which sorting algorithm is fastest in average case?
a. Selection
b. Insertion
c. Quick sort
d. Bubble sort
Answer: c




---

🟣 Operating System

21. Which of the following is a process state?
a. Create
b. Exit
c. Execute
d. All
Answer: d


22. A program in execution is called:
a. File
b. Function
c. Process
d. Module
Answer: c


23. Page table contains:
a. Disk addresses
b. Logical addresses
c. Mapping of pages
d. RAM locations
Answer: c


24. Thrashing occurs when:
a. CPU overload
b. Memory full
c. Excessive paging
d. No I/O
Answer: c


25. FCFS stands for:
a. First Come First Serve
b. Fastest CPU First
c. File Control File System
d. First Copy First Save
Answer: a




---

🟤 DBMS

26. The command to remove a table:
a. DELETE
b. TRUNCATE
c. DROP
d. REMOVE
Answer: c


27. The relational model was proposed by:
a. E. F. Codd
b. Bill Gates
c. Linus Torvalds
d. Tim Berners-Lee
Answer: a


28. ER diagram shows:
a. Only tables
b. Relationship between entities
c. SQL commands
d. Queries
Answer: b


29. SQL is a:
a. Procedural language
b. Object-oriented language
c. Scripting language
d. Declarative language
Answer: d


30. 3NF removes:
a. Partial dependency
b. Transitive dependency
c. Multivalued dependency
d. Duplicate rows
Answer: b




---

🔵 Computer Networks

31. A MAC address is:
a. 48-bit
b. 64-bit
c. 32-bit
d. 128-bit
Answer: a


32. Which is a transport layer protocol?
a. HTTP
b. TCP
c. IP
d. ARP
Answer: b


33. DNS stands for:
a. Data Network Service
b. Domain Name System
c. Distributed Network Structure
d. Digital Node Setup
Answer: b


34. Which one is not a protocol?
a. TCP
b. IP
c. HTTP
d. HTML
Answer: d


35. IPv6 uses ____ bit addresses.
a. 32
b. 64
c. 128
d. 256
Answer: c




---

🟠 Software Engineering

36. Software engineering aims to build:
a. Fast programs
b. High-quality software
c. Games
d. Hardware
Answer: b


37. Which is not a software quality factor?
a. Maintainability
b. Portability
c. Efficiency
d. Electricity
Answer: d


38. Testing done without executing code is:
a. White-box
b. Black-box
c. Static testing
d. Dynamic testing
Answer: c


39. The process of identifying software bugs is:
a. Debugging
b. Refactoring
c. Optimizing
d. Documenting
Answer: a


40. Agile method prefers:
a. Comprehensive documentation
b. Working software
c. No testing
d. Waterfall model
Answer: b




---

🟢 Machine Learning

41. The process of learning from labeled data is:
a. Clustering
b. Supervised learning
c. Unsupervised learning
d. Deep learning
Answer: b


42. Which algorithm is used in recommendation systems?
a. Naive Bayes
b. KNN
c. Collaborative Filtering
d. PCA
Answer: c


43. Dimensionality reduction is done using:
a. SVM
b. K-Means
c. PCA
d. CNN
Answer: c


44. Accuracy is a metric for:
a. Clustering
b. Classification
c. Regression
d. None
Answer: b


45. Which is a regression algorithm?
a. Logistic Regression
b. Decision Tree
c. Linear Regression
d. K-Means
Answer: c




---

🧩 Mixed

46. Which of these is a compiled language?
a. Python
b. JavaScript
c. C
d. Bash
Answer: c


47. A class in OOP is a:
a. Blueprint
b. Module
c. File
d. Function
Answer: a


48. Which protocol is connectionless?
a. TCP
b. FTP
c. UDP
d. HTTP
Answer: c


49. fork() system call is used to:
a. End process
b. Create process
c. Sleep process
d. Restart process
Answer: b


50. Which command displays current directory?
a. pwd
b. ls
c. cd
d. path
Answer: a





Post a Comment

0 Comments