Type Here to Get Search Results !

Jeca mock test 5



✅ WBJEE JECA – Computer Applications – Mock Test 5 (50 Questions with Answers)


🔵 C Programming


1. Which format specifier is used to print a float value?

a. %d

b. %c

c. %f

d. %s

Answer: c



2. Which of the following is not a loop in C?

a. for

b. foreach

c. while

d. do-while

Answer: b



3. How is a single character stored in C?

a. string

b. int

c. char

d. bool

Answer: c



4. Which of the following is the correct syntax for array declaration?

a. int arr;

b. int arr[5];

c. array int arr[5];

d. int[5] arr;

Answer: b



5. What does & symbol represent in C?

a. Bitwise AND

b. Address-of operator

c. Both a and b

d. None

Answer: c





---


🟢 Object Oriented Programming


6. Which feature hides implementation details?

a. Inheritance

b. Abstraction

c. Encapsulation

d. Polymorphism

Answer: b



7. Which of the following is not a type of inheritance in C++?

a. Single

b. Hybrid

c. Multiple

d. Abstract

Answer: d



8. A class with at least one pure virtual function is called:

a. Derived class

b. Base class

c. Abstract class

d. Static class

Answer: c



9. Which operator is overloaded for object assignment?

a. ==

b. =

c. +

d. ->

Answer: b



10. Static data members are shared among:

a. All functions

b. All instances of a class

c. All files

d. All threads

Answer: b





---


🟡 UNIX


11. Which command displays content of a file?

a. rm

b. cp

c. cat

d. mv

Answer: c



12. What is the command to rename a file in UNIX?

a. rn

b. mv

c. rename

d. chg

Answer: b



13. Command used to count lines, words, characters:

a. wc

b. count

c. lines

d. grep

Answer: a



14. What is chmod 777 used for?

a. No access

b. Full access to all

c. Only read access

d. Execution only

Answer: b



15. Which command is used to find files?

a. find

b. locate

c. search

d. grep

Answer: a





---


🔴 Data Structures


16. Stack is implemented using:

a. Queue

b. Array or Linked List

c. Tree

d. Graph

Answer: b



17. Which traversal technique is used in DFS?

a. Inorder

b. Level-order

c. Depth-first

d. Post-order

Answer: c



18. Which is the best case time complexity of bubble sort?

a. O(n^2)

b. O(log n)

c. O(n)

d. O(1)

Answer: c



19. In linked list, the last node contains:

a. Address of first node

b. NULL

c. Zero

d. Next of itself

Answer: b



20. Which of the following is not linear?

a. Stack

b. Queue

c. Tree

d. Array

Answer: c





---


🔵 Operating System


21. Which scheduling algorithm is starvation-free?

a. FCFS

b. Priority

c. SJF

d. Round Robin

Answer: d



22. Which memory is directly accessed by CPU?

a. Virtual

b. Secondary

c. Main

d. Cache

Answer: c



23. Critical section is used in:

a. Scheduling

b. Synchronization

c. Compilation

d. Deadlock

Answer: b



24. Which one is not a memory allocation technique?

a. Paging

b. Segmentation

c. Swapping

d. Compilation

Answer: d



25. Time taken to switch from one process to another:

a. Waiting time

b. Turnaround time

c. Context switching time

d. Idle time

Answer: c





---


🟣 DBMS


26. What is a view in SQL?

a. Table with data

b. Virtual table

c. Function

d. Relation

Answer: b



27. SQL function to count total records:

a. COUNT(*)

b. SUM()

c. TOTAL()

d. RECORDS()

Answer: a



28. Composite key is:

a. Foreign key

b. More than one primary key

c. Multiple fields as key

d. Duplicate keys

Answer: c



29. Which SQL clause is used for filtering rows?

a. ORDER BY

b. GROUP BY

c. WHERE

d. HAVING

Answer: c



30. Which form removes multivalued dependency?

a. 1NF

b. 2NF

c. 3NF

d. 4NF

Answer: d





---


🟤 Computer Networks


31. Data link layer is responsible for:

a. Routing

b. Framing and error control

c. Encryption

d. Port forwarding

Answer: b



32. Which device works on OSI layer 3?

a. Switch

b. Hub

c. Router

d. Repeater

Answer: c



33. What is the protocol used for file transfer?

a. FTP

b. HTTP

c. SMTP

d. TELNET

Answer: a



34. IPv4 address is:

a. 16-bit

b. 32-bit

c. 64-bit

d. 128-bit

Answer: b



35. SSL provides:

a. IP address

b. Security

c. Time sync

d. Bandwidth

Answer: b





---


🟠 Software Engineering


36. Waterfall model follows:

a. Iterative approach

b. Parallel approach

c. Linear sequential approach

d. Agile approach

Answer: c



37. The phase where actual coding is done:

a. Requirement

b. Design

c. Implementation

d. Testing

Answer: c



38. Defect density is:

a. #defects/#lines of code

b. Code coverage

c. Testing efficiency

d. RAM usage

Answer: a



39. Spiral model mainly focuses on:

a. Cost

b. Time

c. Risk

d. People

Answer: c



40. Agile methodology promotes:

a. Long documentation

b. Big teams

c. Iterative delivery

d. One-time testing

Answer: c





---


🔶 Machine Learning


41. Which is a classification algorithm?

a. Linear Regression

b. Logistic Regression

c. K-Means

d. PCA

Answer: b



42. Clustering technique groups data based on:

a. Labels

b. Supervision

c. Similarity

d. Prediction

Answer: c



43. Which model mimics human brain?

a. Decision Tree

b. Random Forest

c. ANN

d. Naive Bayes

Answer: c



44. Which technique reduces overfitting?

a. More training

b. Dropout

c. Noise addition

d. Low learning rate

Answer: b



45. Hidden Markov Model is used for:

a. Static data

b. Time series

c. Classification

d. Clustering

Answer: b





---


🧩 Mixed Concepts


46. scanf() in C requires:

a. #include <math.h>

b. #include <stdio.h>

c. #include <conio.h>

d. #include <stdlib.h>

Answer: b



47. Which is not an OOP language?

a. Python

b. Java

c. C++

d. C

Answer: d



48. Full form of URL:

a. Uniform Resource Locator

b. Unique Resource Label

c. Unified Remote Link

d. Universal Resource Layer

Answer: a



49. SVM works best for:

a. Regression

b. Non-linear data

c. Classification

d. Tree structure

Answer: c



50. IDE stands for:

a. Internal Development Environment

b. Integrated Design Engine

c. Integrated Development Environment

d. Interface Design Environment

Answer: c






Post a Comment

0 Comments