Type Here to Get Search Results !

Jeca 2025 mocktest 10



📘 সিলেবাস টপিকস:

✅ C Programming

✅ Object Oriented Programming (OOP)

✅ UNIX

✅ Data Structures

✅ Operating System

✅ DBMS

✅ Computer Networks

✅ Software Engineering

✅ Machine Learning



---


✅ WBJEE JECA – Computer Applications – Mock Test 10 (50 MCQs with Answers)


🔵 C Programming


1. Which operator has the highest precedence in C?

a. +

b. *

c. ()

d. =

Answer: c



2. Which of the following is a loop in C?

a. if

b. for

c. switch

d. goto

Answer: b



3. sizeof(int) is usually:

a. 2 bytes

b. 4 bytes

c. 6 bytes

d. 8 bytes

Answer: b



4. Which function is used to concatenate strings?

a. strcpy

b. strcmp

c. strcat

d. strlen

Answer: c



5. NULL pointer points to:

a. Some address

b. 0

c. -1

d. Garbage

Answer: b





---


🟢 Object Oriented Programming (OOP)


6. Which concept binds data and functions?

a. Polymorphism

b. Abstraction

c. Encapsulation

d. Inheritance

Answer: c



7. In C++, which access specifier allows access only inside class?

a. public

b. private

c. protected

d. static

Answer: b



8. Virtual function allows:

a. Static binding

b. Dynamic binding

c. Operator overloading

d. Constructor overloading

Answer: b



9. Inheritance improves:

a. Security

b. Speed

c. Code reusability

d. Compilation

Answer: c



10. Object is an instance of:

a. Function

b. Variable

c. Class

d. Operator

Answer: c





---


🟡 UNIX


11. Which command displays calendar?

a. date

b. cal

c. calendar

d. today

Answer: b



12. Which command changes file ownership?

a. chmod

b. chown

c. change

d. chgrp

Answer: b



13. mv command is used for:

a. Move files

b. Copy files

c. Read files

d. Execute files

Answer: a



14. Shell script files usually have extension:

a. .txt

b. .sh

c. .c

d. .exe

Answer: b



15. wc command shows:

a. Word count

b. CPU usage

c. Memory

d. Disk space

Answer: a





---


🔴 Data Structures


16. Which data structure is best for implementing recursion?

a. Queue

b. Array

c. Stack

d. Heap

Answer: c



17. Time complexity of linear search:

a. O(1)

b. O(n)

c. O(log n)

d. O(n log n)

Answer: b



18. Which traversal visits root first?

a. Inorder

b. Postorder

c. Preorder

d. Level order

Answer: c



19. Queue supports:

a. LIFO

b. FIFO

c. Random

d. None

Answer: b



20. Adjacency matrix is used to represent:

a. Arrays

b. Queues

c. Graphs

d. Trees

Answer: c





---


🟣 Operating System


21. Which memory management technique allows non-contiguous allocation?

a. Paging

b. Segmentation

c. Swapping

d. Contiguous allocation

Answer: a



22. Deadlock prevention technique:

a. Wait and die

b. Preemption

c. Mutual exclusion

d. Semaphore

Answer: b



23. Process Control Block contains:

a. Process ID

b. Register state

c. Program counter

d. All of these

Answer: d



24. Which is not an OS?

a. Windows

b. Linux

c. Oracle

d. MacOS

Answer: c



25. Which algorithm is used in disk scheduling?

a. FCFS

b. SSTF

c. SCAN

d. All

Answer: d





---


🟤 DBMS


26. CREATE TABLE is a:

a. DDL

b. DML

c. DCL

d. TCL

Answer: a



27. A foreign key must reference:

a. Primary key

b. Unique key

c. Composite key

d. Any key

Answer: a



28. Which command removes all records but keeps structure?

a. DROP

b. DELETE

c. TRUNCATE

d. ERASE

Answer: c



29. Which of the following is not a SQL clause?

a. WHERE

b. GROUP BY

c. ORDER BY

d. SORT

Answer: d



30. A relation in 2NF is also in:

a. 1NF

b. 3NF

c. BCNF

d. 4NF

Answer: a





---


🔵 Computer Networks


31. Which device connects different networks?

a. Switch

b. Router

c. Hub

d. Bridge

Answer: b



32. FTP is used for:

a. Email

b. File Transfer

c. Browsing

d. DNS

Answer: b



33. Which protocol is connection-oriented?

a. UDP

b. IP

c. TCP

d. ARP

Answer: c



34. Which topology has a central node?

a. Ring

b. Bus

c. Star

d. Mesh

Answer: c



35. IP stands for:

a. Internet Protocol

b. Internal Path

c. Intermediate Protocol

d. Internet Pathway

Answer: a





---


🟠 Software Engineering


36. Which of the following is not a phase of SDLC?

a. Planning

b. Coding

c. Execution

d. Maintenance

Answer: c



37. Design phase results in:

a. Code

b. Flowchart

c. DFD

d. Software architecture

Answer: d



38. Black box testing tests:

a. Source code

b. Design

c. Functionality

d. Loops

Answer: c



39. Spiral model combines:

a. Waterfall + Prototyping

b. Agile + Waterfall

c. Waterfall + Scrum

d. Iteration + Debugging

Answer: a



40. Who performs alpha testing?

a. Developer

b. Client

c. Tester

d. End user

Answer: a





---


🟢 Machine Learning


41. Which ML technique is used when data is unlabeled?

a. Supervised

b. Unsupervised

c. Reinforcement

d. Semi-supervised

Answer: b



42. Which of the following is a supervised algorithm?

a. K-Means

b. PCA

c. Linear Regression

d. Clustering

Answer: c



43. Which algorithm can be used for both classification and regression?

a. Decision Tree

b. SVM

c. KNN

d. All of the above

Answer: d



44. What is used to evaluate classification model performance?

a. RMSE

b. MSE

c. Confusion Matrix

d. Clustering Score

Answer: c



45. Which one is a deep learning framework?

a. TensorFlow

b. SQL

c. Hadoop

d. Spark

Answer: a





---


🧩 Mixed


46. Which loop is guaranteed to execute at least once?

a. for

b. while

c. do-while

d. goto

Answer: c



47. C language was developed in:

a. 1960

b. 1972

c. 1980

d. 1991

Answer: b



48. Which is not a relational DBMS?

a. MySQL

b. PostgreSQL

c. MongoDB

d. Oracle

Answer: c



49. Which command gives IP address in UNIX?

a. ipconfig

b. ifconfig

c. netstat

d. ping

Answer: b



50. free -m in UNIX displays:

a. CPU

b. Memory usage

c. Disk usage

d. Load average

Answer: b






Post a Comment

0 Comments