📘 সিলেবাস টপিকস:
✅ C Programming
✅ Object Oriented Programming (OOP)
✅ UNIX
✅ Data Structures (DS)
✅ Operating System (OS)
✅ Database Management System (DBMS)
✅ Computer Networks (CN)
✅ Software Engineering
✅ Machine Learning
---
✅ WBJEE JECA – Computer Applications – Mock Test 9 (50 MCQs with Answers)
---
🔵 C Programming
1. Which of the following is used to allocate memory dynamically in C?
a. malloc()
b. free()
c. alloc()
d. realloc()
Answer: a
2. Which operator is used to access members of a structure?
a. . (dot)
b. -> (arrow)
c. * (asterisk)
d. & (ampersand)
Answer: a
3. In C, the main() function should return:
a. void
b. int
c. float
d. char
Answer: b
4. What does strcat() function do?
a. Compares two strings
b. Finds length of a string
c. Concatenates two strings
d. Copies one string to another
Answer: c
5. Which of the following is a non-primitive data type in C?
a. int
b. char
c. array
d. float
Answer: c
---
🟢 Object Oriented Programming
6. In C++, which keyword is used to prevent inheritance?
a. private
b. public
c. protected
d. final
Answer: d
7. Which OOP concept is used to hide internal implementation details?
a. Polymorphism
b. Abstraction
c. Inheritance
d. Encapsulation
Answer: b
8. Which of the following is not a valid access specifier in C++?
a. public
b. private
c. friend
d. hidden
Answer: d
9. Destructor in C++ is used for:
a. Initializing objects
b. Creating new instances
c. Destroying objects
d. Modifying the class
Answer: c
10. Function Overloading is:
a. Giving same name to different functions with same parameters
b. Giving same name to different functions with different parameters
c. Changing the function body
d. Changing function type
Answer: b
---
🟡 UNIX
11. The chmod command in UNIX is used to:
a. Change directory
b. Change file permissions
c. Display the file
d. Copy files
Answer: b
12. Which command displays the number of lines in a file?
a. ls
b. cat
c. wc
d. find
Answer: c
13. In UNIX, which command is used to change the owner of a file?
a. chown
b. chgrp
c. chmod
d. mv
Answer: a
14. What does ln command do in UNIX?
a. List files
b. Create symbolic links
c. Move files
d. Delete files
Answer: b
15. Which command is used to view the content of a file in UNIX?
a. touch
b. ls
c. cat
d. write
Answer: c
---
🔴 Data Structures
16. In which data structure, elements are inserted and removed from the same end?
a. Queue
b. Stack
c. Tree
d. Graph
Answer: b
17. A priority queue can be implemented using:
a. Array
b. Stack
c. Heap
d. Linked list
Answer: c
18. Which operation is not possible in a doubly linked list?
a. Insertion
b. Deletion
c. Traversal
d. Sorting
Answer: d
19. In which sorting algorithm, elements are swapped at most once?
a. Bubble sort
b. Insertion sort
c. Selection sort
d. Quick sort
Answer: c
20. A tree with n nodes has at most ____ edges.
a. n
b. n-1
c. n+1
d. 2n
Answer: b
---
🟣 Operating System
21. Which of the following is responsible for allocating CPU time to processes?
a. Scheduler
b. Manager
c. Process Control Block
d. Dispatcher
Answer: a
22. Virtual memory is used to:
a. Increase physical RAM
b. Extend the size of RAM
c. Speed up RAM
d. Store permanent data
Answer: b
23. Which system call is used to create a new process?
a. exec()
b. fork()
c. wait()
d. exit()
Answer: b
24. Which of these is not a scheduling algorithm?
a. First-Come-First-Serve (FCFS)
b. Round-Robin (RR)
c. Priority Scheduling
d. CPU Scheduling
Answer: d
25. A deadlock occurs when:
a. A process is blocked
b. Two or more processes are waiting for each other
c. The system runs out of resources
d. Processes are running
Answer: b
---
🟤 DBMS
26. Which of the following is a function of a DBMS?
a. Data retrieval
b. Data management
c. Data security
d. All of the above
Answer: d
27. Which SQL command is used to retrieve data from a database?
a. SELECT
b. GET
c. OPEN
d. EXTRACT
Answer: a
28. Which of the following is true for a foreign key?
a. It uniquely identifies each record
b. It creates a relationship between tables
c. It is used to sort records
d. It is used to delete records
Answer: b
29. Which of the following is a non-relational database?
a. MySQL
b. PostgreSQL
c. MongoDB
d. Oracle
Answer: c
30. Which normal form removes partial dependency?
a. 1NF
b. 2NF
c. 3NF
d. 4NF
Answer: b
---
🔵 Computer Networks
31. Which layer is responsible for end-to-end communication in OSI model?
a. Data Link
b. Transport
c. Network
d. Application
Answer: b
32. In IP addressing, how many bits are used for the network part in a Class A address?
a. 8
b. 16
c. 24
d. 32
Answer: a
33. The ping command is used to:
a. Check network connection
b. Test file upload speed
c. Check disk usage
d. Test RAM performance
Answer: a
34. Which of the following is used to identify devices in a network?
a. IP address
b. MAC address
c. Domain name
d. DNS
Answer: a
35. The basic unit of data in networking is:
a. Bit
b. Byte
c. Packet
d. Frame
Answer: c
---
🟠 Software Engineering
36. The V-Model is also called:
a. Waterfall model
b. Verification and validation model
c. Agile model
d. Spiral model
Answer: b
37. Which of the following is an example of functional requirement?
a. Easy-to-use interface
b. System must be responsive within 2 seconds
c. Users must be able to log in
d. System should run on multiple devices
Answer: c
38. In the Waterfall model, the process flows:
a. Iteratively
b. Downwards
c. In a loop
d. In a zigzag pattern
Answer: b
39. In which phase is the system designed?
a. Design phase
b. Requirement phase
c. Maintenance phase
d. Testing phase
Answer: a
40. Which of the following is used for tracking changes in the software?
a. Git
b. JIRA
c. Trello
d. Slack
Answer: a
---
🟢 Machine Learning
41. Which algorithm is used for classification problems?
a. Linear regression
b. K-Means
c. Decision Trees
d. PCA
Answer: c
42. Support Vector Machines (SVM) are used for:
a. Clustering
b. Classification
c. Regression
d. Dimensionality reduction
Answer: b
43. Which of the following is a supervised learning technique?
a. K-means
b. KNN
c. PCA
d. Naive Bayes
Answer: d
44. Which of the following algorithms is used for dimensionality reduction?
a. K-Nearest Neighbors
b. Decision Tree
c. Principal Component Analysis
d. Naive Bayes
Answer: c
45. In regression, the goal is to:
a. Maximize the error
b. Find the best-fit line
c. Classify the data
d. Reduce the number of features
Answer: b
---
🧩 Mixed
46. Which programming language is known for its portability?
a. C
b. Python
c. Java
d. C++
Answer: c
47. A class is a template for:
a. Function
b. Object
c. Variable
d. Process
Answer: b
48. A stack is also known as:
a. LIFO
b. FIFO
c. FILO
d. None of the above
Answer: a
49. The first version of UNIX was developed by:
a. Dennis Ritchie
b. Brian Kernighan
c. Ken Thompson
d. Richard Stallman
Answer: c
50. The primary purpose of a database index is to:
a. Speed up queries
b. Store data
c. Encrypt data
d. Create backups
Answer: a