Type Here to Get Search Results !

Jeca 2025 mock test 7


📘 সিলেবাস টপিকস:
✅ C Programming
✅ Object Oriented Programming (OOP)
✅ UNIX
✅ Data Structures (DS)
✅ Operating System (OS)
✅ Database Management System (DBMS)
✅ Computer Networks (CN)
✅ Software Engineering
✅ Machine Learning


✅ WBJEE JECA – Computer Applications – Mock Test 7 (50 MCQs with Answers)



🔵 C Programming

  1. What is the output of printf("%d", 10/4);?
    a. 2
    b. 2.5
    c. 3
    d. 4
    Answer: a

  2. int* ptr; is a:
    a. Integer
    b. Character
    c. Pointer to int
    d. Structure
    Answer: c

  3. Which operator is used for bitwise OR?
    a. &
    b. |
    c. ^
    d. ~
    Answer: b

  4. Which of these is not a valid storage class in C?
    a. auto
    b. static
    c. volatile
    d. register
    Answer: c

  5. strcpy() is used to:
    a. Compare strings
    b. Copy strings
    c. Append strings
    d. Get length
    Answer: b


🟢 Object Oriented Programming

  1. Which concept allows same function name with different signatures?
    a. Inheritance
    b. Polymorphism
    c. Overloading
    d. Abstraction
    Answer: c

  2. Which feature hides internal implementation?
    a. Inheritance
    b. Abstraction
    c. Polymorphism
    d. Function Overloading
    Answer: b

  3. Constructor is called:
    a. After object deletion
    b. Before object creation
    c. At the time of object creation
    d. After object copy
    Answer: c

  4. What is the default access specifier for class members in C++?
    a. public
    b. private
    c. protected
    d. global
    Answer: b

  5. Inheritance allows:
    a. Code duplication
    b. Code hiding
    c. Code reuse
    d. Code deletion
    Answer: c


🟡 UNIX

  1. Which command is used to delete a file?
    a. del
    b. rm
    c. mv
    d. erase
    Answer: b

  2. To display system date:
    a. cal
    b. date
    c. time
    d. now
    Answer: b

  3. To change permission:
    a. chperm
    b. chmod
    c. permchange
    d. changemode
    Answer: b

  4. Command to display last 10 lines:
    a. head
    b. tail
    c. last
    d. show
    Answer: b

  5. ls -a lists:
    a. Only files
    b. Only directories
    c. Hidden files too
    d. Admin files
    Answer: c


🔴 Data Structures

  1. Which algorithm uses divide-and-conquer?
    a. Bubble sort
    b. Merge sort
    c. Linear search
    d. Insertion sort
    Answer: b

  2. Linked list is preferred over array because:
    a. Uses more memory
    b. Fixed size
    c. Dynamic size
    d. Slow
    Answer: c

  3. Which traversal gives sorted output in BST?
    a. Preorder
    b. Postorder
    c. Inorder
    d. Level order
    Answer: c

  4. Queue follows:
    a. LIFO
    b. FIFO
    c. FILO
    d. Random
    Answer: b

  5. Binary tree has max ____ nodes at level l:
    a. 2^l - 1
    b. 2^l
    c. 2*l
    d. l^2
    Answer: b


🟣 Operating System

  1. Semaphore is used for:
    a. CPU scheduling
    b. Memory allocation
    c. Process synchronization
    d. File system
    Answer: c

  2. In Round Robin, each process gets:
    a. Equal CPU time
    b. Max CPU time
    c. Random time
    d. No time
    Answer: a

  3. Page fault occurs when:
    a. Page is in memory
    b. Page is not in memory
    c. Disk is full
    d. RAM crashes
    Answer: b

  4. Swapping means:
    a. Interchanging memory
    b. Exchanging hard disks
    c. Shifting data to printer
    d. CPU sharing
    Answer: a

  5. Ready queue contains:
    a. Completed processes
    b. Blocked processes
    c. Running processes
    d. Processes waiting for CPU
    Answer: d


🟤 DBMS

  1. Which key can be NULL?
    a. Primary
    b. Foreign
    c. Candidate
    d. Super
    Answer: b

  2. Which command removes table data but not structure?
    a. DROP
    b. REMOVE
    c. DELETE
    d. TRUNCATE
    Answer: d

  3. Which level of data abstraction describes how data is stored?
    a. View level
    b. Physical level
    c. Logical level
    d. External level
    Answer: b

  4. Which function finds maximum value?
    a. MAX()
    b. HIGH()
    c. TOP()
    d. LIMIT()
    Answer: a

  5. Which one is not a NoSQL DB?
    a. MongoDB
    b. Cassandra
    c. MySQL
    d. Redis
    Answer: c


🔵 Computer Networks

  1. SMTP is used for:
    a. File transfer
    b. Sending email
    c. Receiving email
    d. Browsing
    Answer: b

  2. Which device works on layer 2 of OSI?
    a. Router
    b. Switch
    c. Repeater
    d. Gateway
    Answer: b

  3. UDP is:
    a. Reliable
    b. Slow
    c. Unreliable
    d. Secured
    Answer: c

  4. Which of the following is NOT a network topology?
    a. Bus
    b. Star
    c. Ring
    d. Triangle
    Answer: d

  5. SSL is used to:
    a. Speed data
    b. Secure connection
    c. Backup data
    d. Filter IP
    Answer: b


🟠 Software Engineering

  1. Which document defines system requirements?
    a. SRS
    b. ERD
    c. DFD
    d. UML
    Answer: a

  2. Which SDLC model has feedback loops?
    a. Waterfall
    b. Spiral
    c. V-model
    d. Linear
    Answer: b

  3. Who is responsible for verifying software quality?
    a. Developer
    b. Tester
    c. Client
    d. Manager
    Answer: b

  4. Alpha testing is performed by:
    a. End users
    b. Developer's team
    c. Public
    d. Stakeholders
    Answer: b

  5. Risk management involves:
    a. Code writing
    b. Testing
    c. Identifying potential issues
    d. Hiring
    Answer: c


🟢 Machine Learning

  1. In ML, labeled data is used in:
    a. Supervised learning
    b. Unsupervised learning
    c. Clustering
    d. Reinforcement learning
    Answer: a

  2. K-means is a:
    a. Classification algorithm
    b. Supervised algorithm
    c. Clustering algorithm
    d. Regression algorithm
    Answer: c

  3. Deep Learning is a subfield of:
    a. Operating system
    b. Software engineering
    c. Machine learning
    d. Computer graphics
    Answer: c

  4. Which is not a distance metric?
    a. Euclidean
    b. Manhattan
    c. Cosine
    d. Decision Tree
    Answer: d

  5. SVM stands for:
    a. Support Vector Model
    b. Supervised Vector Machine
    c. Support Vector Machine
    d. Simple Valid Matrix
    Answer: c


🧩 Mixed

  1. C language is developed by:
    a. Dennis Ritchie
    b. Bjarne Stroustrup
    c. James Gosling
    d. Ken Thompson
    Answer: a

  2. A pointer that doesn’t point to anything is:
    a. Wild pointer
    b. NULL pointer
    c. Garbage pointer
    d. None
    Answer: b

  3. Which class can't be inherited?
    a. Public
    b. Abstract
    c. Final
    d. Base
    Answer: c

  4. Which SQL command gives table structure?
    a. DESCRIBE
    b. SHOW
    c. DEFINE
    d. LIST
    Answer: a

  5. ping command checks:
    a. Internet speed
    b. File existence
    c. Network connectivity
    d. Disk usage
    Answer: c


🔔 

Post a Comment

0 Comments