🧠 WBJEE JECA Computer Applications – Mock Test 3
🟩 C Programming
1. What is the size of int on a 32-bit system?
a. 2 bytes
b. 4 bytes
c. 8 bytes
d. 1 byte
Answer: b
2. Which operator has the highest precedence?
a. +
b. =
c. *
d. ()
Answer: d
3. What is the output of: printf("%d", sizeof('A'));?
a. 2
b. 1
c. 4
d. 8
Answer: c
4. Which function is used to open a file in C?
a. read()
b. fileopen()
c. fopen()
d. openfile()
Answer: c
5. What will strlen("WBJEE") return?
a. 4
b. 5
c. 6
d. 0
Answer: b
---
🟨 Object Oriented Programming
6. Which of these is not an OOP concept?
a. Encapsulation
b. Inheritance
c. Compilation
d. Polymorphism
Answer: c
7. What is the default access modifier for class members?
a. public
b. private
c. protected
d. static
Answer: b
8. Dynamic binding is also known as:
a. Static dispatch
b. Compile time binding
c. Run time binding
d. Inheritance
Answer: c
9. Which keyword is used to define a constant member function?
a. static
b. const
c. final
d. immutable
Answer: b
10. In C++, function overloading is an example of:
a. Inheritance
b. Polymorphism
c. Abstraction
d. Encapsulation
Answer: b
---
🟧 UNIX
11. Which command is used to change directory?
a. cd
b. chdir
c. mkdir
d. ls
Answer: a
12. cat file1 file2 > file3 means:
a. Copy file1 to file2
b. Merge file1 and file2 into file3
c. Delete file1 and file2
d. Rename file3
Answer: b
13. Which command is used to compare files?
a. cat
b. cmp
c. vi
d. echo
Answer: b
14. ps command shows:
a. User info
b. Disk info
c. Process info
d. File system
Answer: c
15. Which of the following is a wildcard character?
a. ^
b. *
c. %
d. &
Answer: b
---
🟩 Data Structures
16. In a max heap, the largest element is at:
a. Leaf
b. Middle
c. Root
d. None
Answer: c
17. Which traversal is used in Depth First Search?
a. Level order
b. Inorder
c. Preorder
d. Breadth-first
Answer: c
18. Best case time for linear search is:
a. O(n)
b. O(1)
c. O(n log n)
d. O(n^2)
Answer: b
19. Stack overflow occurs when:
a. Stack is empty
b. Stack is full
c. Pointer is null
d. Stack is undefined
Answer: b
20. Which data structure is used for BFS?
a. Stack
b. Tree
c. Queue
d. Graph
Answer: c
---
🟦 Operating System
21. Which scheduler selects processes from the ready queue?
a. Short-term
b. Long-term
c. Medium-term
d. IO scheduler
Answer: a
22. Time slicing is used in which algorithm?
a. FCFS
b. SJF
c. Round Robin
d. Priority
Answer: c
23. Swapping is:
a. Page replacement
b. Moving process from disk to RAM
c. CPU scheduling
d. File locking
Answer: b
24. Semaphore is used for:
a. Deadlock detection
b. Synchronization
c. Scheduling
d. Paging
Answer: b
25. Page table is used in:
a. Segmentation
b. Paging
c. Compilation
d. Context switching
Answer: b
---
🟥 DBMS
26. Which of the following is a DDL command?
a. SELECT
b. DELETE
c. UPDATE
d. CREATE
Answer: d
27. Which of these is not a normal form?
a. 1NF
b. 2NF
c. 4NF
d. 5.5NF
Answer: d
28. Foreign key is used for:
a. Uniqueness
b. Referential integrity
c. Duplicates
d. Primary record
Answer: b
29. ACID properties do not include:
a. Atomicity
b. Consistency
c. Durability
d. Clustering
Answer: d
30. SQL command to remove all rows from a table:
a. REMOVE
b. TRUNCATE
c. DELETE *
d. DROP
Answer: b
---
🟫 Computer Networks
31. Which layer handles error control?
a. Network
b. Transport
c. Session
d. Data Link
Answer: d
32. Protocol for email:
a. HTTP
b. FTP
c. SMTP
d. TCP
Answer: c
33. Which topology has a central hub?
a. Ring
b. Star
c. Mesh
d. Bus
Answer: b
34. IPv6 address size is:
a. 32-bit
b. 64-bit
c. 128-bit
d. 256-bit
Answer: c
35. Which protocol is connectionless?
a. TCP
b. HTTP
c. UDP
d. FTP
Answer: c
---
🟪 Software Engineering
36. Spiral model emphasizes on:
a. Testing
b. Planning
c. Risk analysis
d. Coding
Answer: c
37. Which phase includes requirement analysis?
a. Design
b. Planning
c. Analysis
d. Testing
Answer: c
38. SRS stands for:
a. Software Requirement Sheet
b. System Ready Script
c. Software Requirements Specification
d. Specification Requirements Software
Answer: c
39. Agile model promotes:
a. Sequential delivery
b. Waterfall
c. Iterative development
d. Long documentation
Answer: c
40. CASE tools are used in:
a. Networking
b. Software engineering
c. Hardware testing
d. Database
Answer: b
---
🟧 Machine Learning
41. What is overfitting in ML?
a. Model fits training data too well
b. Model generalizes well
c. Model is fast
d. Model is linear
Answer: a
42. Clustering is:
a. Supervised learning
b. Reinforcement learning
c. Unsupervised learning
d. Semi-supervised
Answer: c
43. Which of these is a classifier?
a. Decision Tree
b. K-Means
c. PCA
d. LDA
Answer: a
44. Which algorithm works well for linearly separable data?
a. KNN
b. Naive Bayes
c. SVM
d. DBSCAN
Answer: c
45. Hidden layers are part of:
a. Linear regression
b. Decision tree
c. Neural networks
d. K-Means
Answer: c
---
🧩 Mixed Concepts
46. Which file extension is valid for C++?
a. .cpp
b. .cxx
c. .cc
d. All of the above
Answer: d
47. Full form of DMA:
a. Direct Media Access
b. Data Memory Access
c. Direct Memory Access
d. Dynamic Memory Allocation
Answer: c
48. Which layer encrypts data?
a. Presentation
b. Session
c. Application
d. Network
Answer: a
49. Best sorting algorithm in average case?
a. Selection sort
b. Merge sort
c. Bubble sort
d. Insertion sort
Answer: b
50. Which keyword is used to create a template in C++?
a. generic
b. class
c. template
d. typedef
Answer: c