Type Here to Get Search Results !

JECA 2025 MOCK TEST 1


✅ WBJEE JECA Computer Applications – Mock Test 1 (50 Questions with Answer)



1. What is the size of int data type (in bytes) in most modern C compilers?


a. 8

b. 4

c. 2

d. 1

Answer: b


2. Which of the following is not a valid C variable name?


a. total_marks

b. 2marks

c. marks2

d. _marks

Answer: b


3. What does scanf("%d", &x); do?


a. Prints an integer

b. Takes integer input

c. Takes float input

d. None

Answer: b


4. Which operator has the highest precedence?


a. +

b. *

c. =

d. ()

Answer: d


5. if-else is an example of:


a. Loop

b. Jump

c. Selection

d. Assignment

Answer: c


6. Which loop checks condition before execution?


a. do-while

b. while

c. goto

d. switch

Answer: b


7. What is the default return type of a C function?


a. float

b. int

c. void

d. char

Answer: b


8. An array index in C starts from:


a. 0

b. 1

c. -1

d. Depends

Answer: a


9. A pointer stores:


a. Value

b. Address

c. Data type

d. None

Answer: b


10. strcpy() is defined in:


a. stdio.h

b. math.h

c. string.h

d. stdlib.h

Answer: c



---


11. Structure is:


a. Collection of similar data

b. Collection of different data types

c. Only int values

d. Pointer data

Answer: b


12. Which is true about union in C?


a. Stores multiple values at once

b. Shares memory

c. Same as structure

d. None

Answer: b


13. Which is not a preprocessor directive?


a. #define

b. #include

c. #pragma

d. #main

Answer: d


14. Command line arguments are accessed via:


a. main()

b. scanf()

c. getc()

d. argv[]

Answer: d


15. OOP is based on:


a. Functions

b. Classes

c. Procedures

d. Arrays

Answer: b


16. Function overloading means:


a. Same name, different parameters

b. Many functions in one

c. Static functions

d. Unused functions

Answer: a


17. 'this' pointer refers to:


a. Global variable

b. Current object

c. Previous class

d. None

Answer: b


18. Constructor is:


a. Any function

b. Special function with same name as class

c. Main function

d. Destructor

Answer: b


19. Virtual function is used in:


a. Overriding

b. Overloading

c. Static members

d. None

Answer: a


20. Abstract class has:


a. No member

b. At least one pure virtual function

c. All concrete methods

d. None

Answer: b



---


21. Which is a UNIX command?


a. ps

b. vi

c. mv

d. All

Answer: d


22. Command to list current directory?


a. pwd

b. mv

c. ps

d. rm

Answer: a


23. chmod is used to:


a. Rename file

b. Change permission

c. Delete file

d. Copy file

Answer: b


24. Command to count words:


a. sort

b. wc

c. cat

d. echo

Answer: b


25. Shell script is:


a. Compiled

b. Executed line-by-line

c. Not executable

d. None

Answer: b



---


26. Stack follows:


a. FIFO

b. LIFO

c. Random

d. None

Answer: b


27. Insertion in queue is called:


a. Enqueue

b. Push

c. Pop

d. Delete

Answer: a


28. Binary search complexity:


a. O(n)

b. O(log n)

c. O(n log n)

d. O(1)

Answer: b


29. Inorder traversal of binary tree:


a. Left, Root, Right

b. Root, Left, Right

c. Right, Left, Root

d. None

Answer: a


30. Graph is:


a. Tree

b. Circular Queue

c. Non-linear

d. Array

Answer: c



---


31. Interrupt transfers control to:


a. RAM

b. Subroutine

c. I/O

d. CPU

Answer: b


32. DMA stands for:


a. Digital Memory Access

b. Direct Memory Access

c. Data Management Access

d. None

Answer: b


33. Which is volatile memory?


a. ROM

b. RAM

c. HDD

d. SSD

Answer: b



---


34. Scheduling algorithm in OS:


a. FIFO

b. Round Robin

c. Priority

d. All

Answer: d


35. Deadlock requires:


a. Mutual exclusion

b. Hold and wait

c. No preemption

d. All

Answer: d


36. Page replacement algorithm:


a. FIFO

b. LRU

c. Optimal

d. All

Answer: d



---


37. TCP is:


a. Connectionless

b. Connection-oriented

c. Datagram protocol

d. None

Answer: b


38. IPv6 address size:


a. 32-bit

b. 64-bit

c. 128-bit

d. 256-bit

Answer: c


39. DNS stands for:


a. Domain Network Server

b. Domain Name System

c. Direct Network Setup

d. None

Answer: b



---


40. SQL is:


a. Procedural

b. Declarative

c. High-level programming

d. None

Answer: b


41. Primary key:


a. Duplicate allowed

b. Must be NULL

c. Unique + NOT NULL

d. Foreign key

Answer: c


42. Which is valid Normal Form?


a. 1NF

b. 2NF

c. 3NF

d. All

Answer: d



---


43. Waterfall model is:


a. Agile model

b. Linear sequential model

c. Iterative

d. Spiral

Answer: b


44. Requirement engineering involves:


a. Gathering needs

b. Writing code

c. Designing DB

d. All

Answer: a


45. Testing where full software is tested:


a. Unit

b. System

c. Integration

d. Alpha

Answer: b



---


46. Classification is a type of:


a. Clustering

b. Supervised learning

c. Unsupervised learning

d. Reinforcement

Answer: b


47. Decision tree splits data by:


a. Distance

b. Entropy/information gain

c. Centroid

d. Weight

Answer: b


48. ANN is inspired by:


a. Trees

b. Graphs

c. Human brain

d. CPU

Answer: c


49. SVM finds:


a. Closest points

b. Decision boundary

c. Clusters

d. None

Answer: b


50. HMM is used in:


a. Time series

b. Image processing

c. Sorting

d. Database

Answer: a






Post a Comment

0 Comments