✅ WBJEE JECA – Computer Applications – Mock Test 5 (50 Questions with Answers)
🔵 C Programming
1. Which format specifier is used to print a float value?
a. %d
b. %c
c. %f
d. %s
Answer: c
2. Which of the following is not a loop in C?
a. for
b. foreach
c. while
d. do-while
Answer: b
3. How is a single character stored in C?
a. string
b. int
c. char
d. bool
Answer: c
4. Which of the following is the correct syntax for array declaration?
a. int arr;
b. int arr[5];
c. array int arr[5];
d. int[5] arr;
Answer: b
5. What does & symbol represent in C?
a. Bitwise AND
b. Address-of operator
c. Both a and b
d. None
Answer: c
---
🟢 Object Oriented Programming
6. Which feature hides implementation details?
a. Inheritance
b. Abstraction
c. Encapsulation
d. Polymorphism
Answer: b
7. Which of the following is not a type of inheritance in C++?
a. Single
b. Hybrid
c. Multiple
d. Abstract
Answer: d
8. A class with at least one pure virtual function is called:
a. Derived class
b. Base class
c. Abstract class
d. Static class
Answer: c
9. Which operator is overloaded for object assignment?
a. ==
b. =
c. +
d. ->
Answer: b
10. Static data members are shared among:
a. All functions
b. All instances of a class
c. All files
d. All threads
Answer: b
---
🟡 UNIX
11. Which command displays content of a file?
a. rm
b. cp
c. cat
d. mv
Answer: c
12. What is the command to rename a file in UNIX?
a. rn
b. mv
c. rename
d. chg
Answer: b
13. Command used to count lines, words, characters:
a. wc
b. count
c. lines
d. grep
Answer: a
14. What is chmod 777 used for?
a. No access
b. Full access to all
c. Only read access
d. Execution only
Answer: b
15. Which command is used to find files?
a. find
b. locate
c. search
d. grep
Answer: a
---
🔴 Data Structures
16. Stack is implemented using:
a. Queue
b. Array or Linked List
c. Tree
d. Graph
Answer: b
17. Which traversal technique is used in DFS?
a. Inorder
b. Level-order
c. Depth-first
d. Post-order
Answer: c
18. Which is the best case time complexity of bubble sort?
a. O(n^2)
b. O(log n)
c. O(n)
d. O(1)
Answer: c
19. In linked list, the last node contains:
a. Address of first node
b. NULL
c. Zero
d. Next of itself
Answer: b
20. Which of the following is not linear?
a. Stack
b. Queue
c. Tree
d. Array
Answer: c
---
🔵 Operating System
21. Which scheduling algorithm is starvation-free?
a. FCFS
b. Priority
c. SJF
d. Round Robin
Answer: d
22. Which memory is directly accessed by CPU?
a. Virtual
b. Secondary
c. Main
d. Cache
Answer: c
23. Critical section is used in:
a. Scheduling
b. Synchronization
c. Compilation
d. Deadlock
Answer: b
24. Which one is not a memory allocation technique?
a. Paging
b. Segmentation
c. Swapping
d. Compilation
Answer: d
25. Time taken to switch from one process to another:
a. Waiting time
b. Turnaround time
c. Context switching time
d. Idle time
Answer: c
---
🟣 DBMS
26. What is a view in SQL?
a. Table with data
b. Virtual table
c. Function
d. Relation
Answer: b
27. SQL function to count total records:
a. COUNT(*)
b. SUM()
c. TOTAL()
d. RECORDS()
Answer: a
28. Composite key is:
a. Foreign key
b. More than one primary key
c. Multiple fields as key
d. Duplicate keys
Answer: c
29. Which SQL clause is used for filtering rows?
a. ORDER BY
b. GROUP BY
c. WHERE
d. HAVING
Answer: c
30. Which form removes multivalued dependency?
a. 1NF
b. 2NF
c. 3NF
d. 4NF
Answer: d
---
🟤 Computer Networks
31. Data link layer is responsible for:
a. Routing
b. Framing and error control
c. Encryption
d. Port forwarding
Answer: b
32. Which device works on OSI layer 3?
a. Switch
b. Hub
c. Router
d. Repeater
Answer: c
33. What is the protocol used for file transfer?
a. FTP
b. HTTP
c. SMTP
d. TELNET
Answer: a
34. IPv4 address is:
a. 16-bit
b. 32-bit
c. 64-bit
d. 128-bit
Answer: b
35. SSL provides:
a. IP address
b. Security
c. Time sync
d. Bandwidth
Answer: b
---
🟠 Software Engineering
36. Waterfall model follows:
a. Iterative approach
b. Parallel approach
c. Linear sequential approach
d. Agile approach
Answer: c
37. The phase where actual coding is done:
a. Requirement
b. Design
c. Implementation
d. Testing
Answer: c
38. Defect density is:
a. #defects/#lines of code
b. Code coverage
c. Testing efficiency
d. RAM usage
Answer: a
39. Spiral model mainly focuses on:
a. Cost
b. Time
c. Risk
d. People
Answer: c
40. Agile methodology promotes:
a. Long documentation
b. Big teams
c. Iterative delivery
d. One-time testing
Answer: c
---
🔶 Machine Learning
41. Which is a classification algorithm?
a. Linear Regression
b. Logistic Regression
c. K-Means
d. PCA
Answer: b
42. Clustering technique groups data based on:
a. Labels
b. Supervision
c. Similarity
d. Prediction
Answer: c
43. Which model mimics human brain?
a. Decision Tree
b. Random Forest
c. ANN
d. Naive Bayes
Answer: c
44. Which technique reduces overfitting?
a. More training
b. Dropout
c. Noise addition
d. Low learning rate
Answer: b
45. Hidden Markov Model is used for:
a. Static data
b. Time series
c. Classification
d. Clustering
Answer: b
---
🧩 Mixed Concepts
46. scanf() in C requires:
a. #include <math.h>
b. #include <stdio.h>
c. #include <conio.h>
d. #include <stdlib.h>
Answer: b
47. Which is not an OOP language?
a. Python
b. Java
c. C++
d. C
Answer: d
48. Full form of URL:
a. Uniform Resource Locator
b. Unique Resource Label
c. Unified Remote Link
d. Universal Resource Layer
Answer: a
49. SVM works best for:
a. Regression
b. Non-linear data
c. Classification
d. Tree structure
Answer: c
50. IDE stands for:
a. Internal Development Environment
b. Integrated Design Engine
c. Integrated Development Environment
d. Interface Design Environment
Answer: c