📘 সিলেবাস টপিকস:
✅ C Programming
✅ Object Oriented Programming (OOP)
✅ UNIX
✅ Data Structures (DS)
✅ Operating System (OS)
✅ Database Management System (DBMS)
✅ Computer Networks (CN)
✅ Software Engineering
✅ Machine Learning
✅ WBJEE JECA – Computer Applications – Mock Test 7 (50 MCQs with Answers)
🔵 C Programming
-
What is the output of
printf("%d", 10/4);
?
a. 2
b. 2.5
c. 3
d. 4
Answer: a -
int* ptr;
is a:
a. Integer
b. Character
c. Pointer to int
d. Structure
Answer: c -
Which operator is used for bitwise OR?
a. &
b. |
c. ^
d. ~
Answer: b -
Which of these is not a valid storage class in C?
a. auto
b. static
c. volatile
d. register
Answer: c -
strcpy()
is used to:
a. Compare strings
b. Copy strings
c. Append strings
d. Get length
Answer: b
🟢 Object Oriented Programming
-
Which concept allows same function name with different signatures?
a. Inheritance
b. Polymorphism
c. Overloading
d. Abstraction
Answer: c -
Which feature hides internal implementation?
a. Inheritance
b. Abstraction
c. Polymorphism
d. Function Overloading
Answer: b -
Constructor is called:
a. After object deletion
b. Before object creation
c. At the time of object creation
d. After object copy
Answer: c -
What is the default access specifier for class members in C++?
a. public
b. private
c. protected
d. global
Answer: b -
Inheritance allows:
a. Code duplication
b. Code hiding
c. Code reuse
d. Code deletion
Answer: c
🟡 UNIX
-
Which command is used to delete a file?
a. del
b. rm
c. mv
d. erase
Answer: b -
To display system date:
a. cal
b. date
c. time
d. now
Answer: b -
To change permission:
a. chperm
b. chmod
c. permchange
d. changemode
Answer: b -
Command to display last 10 lines:
a. head
b. tail
c. last
d. show
Answer: b -
ls -a
lists:
a. Only files
b. Only directories
c. Hidden files too
d. Admin files
Answer: c
🔴 Data Structures
-
Which algorithm uses divide-and-conquer?
a. Bubble sort
b. Merge sort
c. Linear search
d. Insertion sort
Answer: b -
Linked list is preferred over array because:
a. Uses more memory
b. Fixed size
c. Dynamic size
d. Slow
Answer: c -
Which traversal gives sorted output in BST?
a. Preorder
b. Postorder
c. Inorder
d. Level order
Answer: c -
Queue follows:
a. LIFO
b. FIFO
c. FILO
d. Random
Answer: b -
Binary tree has max ____ nodes at level
l
:
a. 2^l - 1
b. 2^l
c. 2*l
d. l^2
Answer: b
🟣 Operating System
-
Semaphore is used for:
a. CPU scheduling
b. Memory allocation
c. Process synchronization
d. File system
Answer: c -
In Round Robin, each process gets:
a. Equal CPU time
b. Max CPU time
c. Random time
d. No time
Answer: a -
Page fault occurs when:
a. Page is in memory
b. Page is not in memory
c. Disk is full
d. RAM crashes
Answer: b -
Swapping means:
a. Interchanging memory
b. Exchanging hard disks
c. Shifting data to printer
d. CPU sharing
Answer: a -
Ready queue contains:
a. Completed processes
b. Blocked processes
c. Running processes
d. Processes waiting for CPU
Answer: d
🟤 DBMS
-
Which key can be NULL?
a. Primary
b. Foreign
c. Candidate
d. Super
Answer: b -
Which command removes table data but not structure?
a. DROP
b. REMOVE
c. DELETE
d. TRUNCATE
Answer: d -
Which level of data abstraction describes how data is stored?
a. View level
b. Physical level
c. Logical level
d. External level
Answer: b -
Which function finds maximum value?
a. MAX()
b. HIGH()
c. TOP()
d. LIMIT()
Answer: a -
Which one is not a NoSQL DB?
a. MongoDB
b. Cassandra
c. MySQL
d. Redis
Answer: c
🔵 Computer Networks
-
SMTP is used for:
a. File transfer
b. Sending email
c. Receiving email
d. Browsing
Answer: b -
Which device works on layer 2 of OSI?
a. Router
b. Switch
c. Repeater
d. Gateway
Answer: b -
UDP is:
a. Reliable
b. Slow
c. Unreliable
d. Secured
Answer: c -
Which of the following is NOT a network topology?
a. Bus
b. Star
c. Ring
d. Triangle
Answer: d -
SSL is used to:
a. Speed data
b. Secure connection
c. Backup data
d. Filter IP
Answer: b
🟠 Software Engineering
-
Which document defines system requirements?
a. SRS
b. ERD
c. DFD
d. UML
Answer: a -
Which SDLC model has feedback loops?
a. Waterfall
b. Spiral
c. V-model
d. Linear
Answer: b -
Who is responsible for verifying software quality?
a. Developer
b. Tester
c. Client
d. Manager
Answer: b -
Alpha testing is performed by:
a. End users
b. Developer's team
c. Public
d. Stakeholders
Answer: b -
Risk management involves:
a. Code writing
b. Testing
c. Identifying potential issues
d. Hiring
Answer: c
🟢 Machine Learning
-
In ML, labeled data is used in:
a. Supervised learning
b. Unsupervised learning
c. Clustering
d. Reinforcement learning
Answer: a -
K-means is a:
a. Classification algorithm
b. Supervised algorithm
c. Clustering algorithm
d. Regression algorithm
Answer: c -
Deep Learning is a subfield of:
a. Operating system
b. Software engineering
c. Machine learning
d. Computer graphics
Answer: c -
Which is not a distance metric?
a. Euclidean
b. Manhattan
c. Cosine
d. Decision Tree
Answer: d -
SVM stands for:
a. Support Vector Model
b. Supervised Vector Machine
c. Support Vector Machine
d. Simple Valid Matrix
Answer: c
🧩 Mixed
-
C language is developed by:
a. Dennis Ritchie
b. Bjarne Stroustrup
c. James Gosling
d. Ken Thompson
Answer: a -
A pointer that doesn’t point to anything is:
a. Wild pointer
b. NULL pointer
c. Garbage pointer
d. None
Answer: b -
Which class can't be inherited?
a. Public
b. Abstract
c. Final
d. Base
Answer: c -
Which SQL command gives table structure?
a. DESCRIBE
b. SHOW
c. DEFINE
d. LIST
Answer: a -
ping
command checks:
a. Internet speed
b. File existence
c. Network connectivity
d. Disk usage
Answer: c
🔔