Type Here to Get Search Results !

Jeca 2025 Mock test 6



📘 সিলেবাস টপিকস
✅ C Programming
✅ OOP (Object Oriented Programming)
✅ UNIX
✅ Data Structures
✅ Operating System
✅ DBMS
✅ Computer Networks
✅ Software Engineering
✅ Machine Learning


---

✅ WBJEE JECA – Computer Applications – Mock Test 6 (50 MCQs with Answers)



🔵 C Programming

1. Which of the following is a keyword in C?
a. then
b. void
c. define
d. main
Answer: b


2. The default return type of a function in C is:
a. int
b. void
c. float
d. double
Answer: a


3. gets() function is used to:
a. Get integers
b. Get a string from user
c. Get characters only
d. Get system input
Answer: b


4. The result of sizeof(int) in 64-bit system is:
a. 2
b. 4
c. 8
d. 16
Answer: b


5. Which header file includes malloc()?
a. stdio.h
b. stdlib.h
c. math.h
d. string.h
Answer: b




---

🟢 Object Oriented Programming (OOP)

6. Which OOP concept allows objects to take many forms?
a. Encapsulation
b. Inheritance
c. Polymorphism
d. Abstraction
Answer: c


7. A constructor with no parameters is called:
a. Inline constructor
b. Default constructor
c. Null constructor
d. Private constructor
Answer: b


8. Which operator can be overloaded in C++?
a. ::
b. sizeof
c. ->
d. +
Answer: d


9. Which keyword is used to define a class in C++?
a. struct
b. class
c. define
d. object
Answer: b


10. In C++, which keyword creates objects on heap?
a. malloc
b. free
c. new
d. alloc
Answer: c




---

🟡 UNIX

11. pwd command shows:
a. Print word document
b. Present working directory
c. Present write device
d. Parent working directory
Answer: b


12. Which command is used to see currently running processes?
a. ps
b. top
c. jobs
d. All of the above
Answer: d


13. chmod +x file means:
a. Add execute permission
b. Remove execute permission
c. Delete file
d. Rename file
Answer: a


14. grep command is used for:
a. Editing files
b. Searching patterns
c. Changing directory
d. Creating files
Answer: b


15. Shell script file extension is:
a. .exe
b. .c
c. .sh
d. .bat
Answer: c




---

🔴 Data Structures

16. Which is a linear data structure?
a. Tree
b. Graph
c. Array
d. Heap
Answer: c


17. What is the worst-case time for binary search?
a. O(n)
b. O(log n)
c. O(n log n)
d. O(1)
Answer: b


18. Which data structure is used in recursion?
a. Queue
b. Stack
c. Array
d. Graph
Answer: b


19. Circular queue overcomes:
a. Underflow
b. Overflow
c. Wastage of space
d. Duplicates
Answer: c


20. Which of these is used in BFS?
a. Stack
b. Queue
c. Array
d. Tree
Answer: b




---

🟣 Operating System

21. CPU scheduling algorithm that gives equal time:
a. Round Robin
b. FCFS
c. SJF
d. Priority
Answer: a


22. Thrashing leads to:
a. High CPU usage
b. Low memory usage
c. Low CPU performance
d. Fast processing
Answer: c


23. A deadlock requires:
a. Preemption
b. No hold and wait
c. Mutual exclusion
d. No circular wait
Answer: c


24. The smallest unit of memory:
a. Byte
b. Word
c. Bit
d. Page
Answer: c


25. Process table stores:
a. Process IDs
b. Program codes
c. PCB entries
d. Memory address
Answer: c




---

🟤 DBMS

26. Which command creates a table in SQL?
a. CREATE
b. BUILD
c. MAKE
d. INIT
Answer: a


27. SELECT * FROM emp; returns:
a. First row
b. Last row
c. All columns
d. Primary key only
Answer: c


28. Which of the following ensures data uniqueness?
a. Primary Key
b. Foreign Key
c. Index
d. View
Answer: a


29. A tuple in a table represents:
a. Column
b. Row
c. Field
d. Schema
Answer: b


30. Which form eliminates duplicate rows?
a. 1NF
b. 2NF
c. 3NF
d. 5NF
Answer: d




---

🔵 Computer Networks

31. Which device connects two networks?
a. Switch
b. Hub
c. Repeater
d. Router
Answer: d


32. TCP is a:
a. Connectionless protocol
b. Secure protocol
c. Connection-oriented protocol
d. Static protocol
Answer: c


33. IP address 192.168.0.1 belongs to:
a. Public network
b. Private network
c. Class A
d. Class D
Answer: b


34. Protocol for remote login:
a. FTP
b. TELNET
c. TCP
d. POP
Answer: b


35. Number of layers in OSI model:
a. 5
b. 6
c. 7
d. 4
Answer: c




---

🟠 Software Engineering

36. Which phase gathers system requirements?
a. Testing
b. Planning
c. Requirement analysis
d. Deployment
Answer: c


37. UML stands for:
a. Unified Modeling Language
b. User Machine Language
c. Universal Machine Language
d. Unified Module Layout
Answer: a


38. Which is not a software process model?
a. Spiral
b. Waterfall
c. V-Model
d. Prototype
Answer: c


39. Which is not a functional requirement?
a. File upload
b. User login
c. Speed of operation
d. Email verification
Answer: c


40. SQA stands for:
a. Software Quick Access
b. Software Quality Assurance
c. System Query Analyzer
d. Software Queue Architecture
Answer: b




---

🟢 Machine Learning

41. Which of the following is supervised learning?
a. PCA
b. K-Means
c. Decision Tree
d. DBSCAN
Answer: c


42. Which algorithm is used in spam filtering?
a. SVM
b. Naive Bayes
c. K-Means
d. ANN
Answer: b


43. Which of these is not used for classification?
a. Logistic Regression
b. Decision Tree
c. Linear Regression
d. SVM
Answer: c


44. Training data is required in:
a. Supervised Learning
b. Unsupervised Learning
c. Reinforcement Learning
d. Deep Learning
Answer: a


45. Reinforcement learning is based on:
a. Past data
b. Trial and error
c. Labeled data
d. No data
Answer: b




---

🧩 Mixed Concepts

46. Which language is platform-independent?
a. C
b. Java
c. Assembly
d. Pascal
Answer: b


47. strcmp() is used in C for:
a. String copy
b. String reverse
c. String compare
d. String length
Answer: c


48. An object is an instance of:
a. Class
b. Variable
c. Array
d. Structure
Answer: a


49. Which layer in OSI handles encryption?
a. Application
b. Transport
c. Presentation
d. Network
Answer: c


50. Best ML algorithm for handwriting recognition:
a. SVM
b. CNN
c. K-Means
d. Naive Bayes
Answer: b




Post a Comment

0 Comments