Computer programmer model paper

कंप्यूटर प्रोग्रामर मॉडल पेपर – 01

71. Which of the following is FALSE in C?

(A) Keywords can be used as variable names
(B) Variable names can contain a digit

(C) Variable names do not contain a blank space
(D) Capital letters can be used in variables

Show Answer

Answer – A 

Hide Answer

72. Which of the following are tokens in C?
(A) Keywords
(B) Variables
(C) Constraints
(D) All of the above

Show Answer

Answer – D 

Hide Answer

73. A function popularly used C input function
(A) scanf
(B) printf
(C) getch
(D) Char

Show Answer

Answer – A 

Hide Answer

74. The << operator is used for
(A) Right shifting
(B) Left shifting
(C) Bitwise shifting
(D) Bitwise complement

Show Answer

Answer – B 

Hide Answer

75. Which escape character can be used to begin a new line in C ……..

(A) \a
(B) \m
(C) \b
(D) \n

Show Answer

Answer – D 

Hide Answer

76. Output of the following C program fragment is. x=5; y=x++; printf(“%d %d”, x,y);
(A) 5, 6
(B) 5, 5
(C) 6, 5
(D) 6, 6

Show Answer

Answer – C 

Hide Answer

77. What is the output of the following program segment? main( ) { long i=65536; printf(“%d\n”, i);}
(A) 0
(B) 65536
(C) -1
(D) 65

Show Answer

Answer – A 

Hide Answer

78. Which symbol is used as a statement terminator in C?
(A) !
(B) ~
(C) #
(D) ;

Show Answer

Answer – D 

Hide Answer

79. In C, if you pass an array as an argument to a function, what actually gets passed?
(A) Value of elements in array
(B) First element of the array
(C) Base address of the array
(D) Address of the last element of array

Show Answer

Answer – C 

Hide Answer

80. The computer network is 
(A) Network computer with cable
(B) Network computer without cable
(C) Both of the above
(D) None of the above

Show Answer

Answer – B 

Hide Answer

81. …………….. entities are entities in the same layer on different machines. 
(A) Software
(B) Service
(C) Peer
(D) Interface

Show Answer

Answer – C 

Hide Answer

82. …………… is a set of connecting links between LANs.

(A) CAN
(B) WAN
(C) CLAN
(D) IAN

Show Answer

Answer – B 

Hide Answer

83. A simple cabling method, known as the ………… topology, allows about 30 computers on a maximum cable length of about 600 feet. 

(A) Star
(B) Ring
(C) Bus
(D) Tree

Show Answer

Answer – C 

Hide Answer

84. A network that needs human beings to manually route signals is called….
(A) Fiber Optic Network
(B) Bus Network
(C) T-switched network
(D) Ring network

Show Answer

Answer – C 

Hide Answer

85. TCP/IP …………….. layer corresponds to the OSI models to three layers.

(A) Application
(B) Presentation
(C) Session
(D) Transport

Show Answer

Answer – A 

Hide Answer

86. The data unit in the TCP/IP data link layer called a …..
(A) Message
(B) Segment
(C) Datagram
(D) Frame

Show Answer

Answer – D 

Hide Answer

87. Which of the following is the logical topology?
(A) Bus
(B) Tree
(C) Star
(D) Both A and B

Show Answer

Answer – A 

Hide Answer

88. Another name for Usenet is 
(A) Gopher
(B) Newsgroups
(C) Browser
(D) CERN

Show Answer

Answer – B 

Hide Answer

89. Find out the OSI layer, which performs token management.
(A) Network Layer
(B) Transport Layer
(C) Session Layer
(D) Presentation Layer

Show Answer

Answer – C 

Hide Answer

90. Which of the communication modes support two way traffic but in only once direction of a time?

(A) Simplex
(B) Half-duplex
(C) Three – quarter’s duplex
(D) Full duplex

Show Answer

Answer – B 

Hide Answer

प्रातिक्रिया दे

Your email address will not be published.