Book Back All One Word Questions and Answers CSC
Book Back All One Word Questions and Answers CSC
1. The small sections of code that are used to perform a particular task is called
(A) Subroutines (B) Files (C) Pseudo code (D) Modules
2. Which of the following is a unit of code that is often defined within a greater code
structure? (A) Subroutines (B) Function (C) Files (D) Modules
3. Which of the following is a distinct syntactic block?
(A) Subroutines (B) Function (C) Definition (D) Modules
4. The variables in a function definition are called as ----------
(A) Subroutines (B) Function (C) Definition (D) Parameters
5. The values which are passed to a function definition are called -------
(A) Arguments (B) Subroutines (C) Function (D) Definition
6. Which of the following are mandatory to write the type annotations in the function
definition?
(A) Curly braces (B) Parentheses (C) Square brackets (D) indentations
7. Which of the following defines what an object can do?
(A) Operating System (B) Compiler (C) Interface (D) Interpreter
8. Which of the following carries out the instructions defined in the interface?
(A) Operating System (B) Compiler (C) Implementation (D) Interpreter
9. The functions which will give exact result when same arguments are passed are called
(A) Impure functions (B) Partial Functions (C) Dynamic Functions (D) Pure functions
10. The functions which cause side effects to the arguments passed are called
(A) impure function (B) Partial Functions (C) Dynamic Functions (D) Pure functions
CHAPTER 2
11. Which of the following functions that build the abstract data type ?
(A) Constructors (B) Destructors (C) recursive (D)Nested
12. Which of the following functions that retrieve information from the data type?
(A) Constructors (B) Selectors (C) recursive (D)Nested
13. The data structure which is a mutable ordered sequence of elements is called
(A) Built in (B) List (C) Tuple (D) Derived data
14. A sequence of immutable objects is called
(A) Built in (B) List (C) Tuple (D) Derived data
15. The data type whose representation is known are called
(A)Built in datatype (B) Derived datatype (C) Concrete datatype (D) Abstract datatype
16. The data type whose representation is unknown are called
(A)Built in datatype (B) Derived datatype (C) Concrete datatype (D) Abstract datatype
17. Which of the following is a compound structure?
(A) Pair (B) Triplet (C) single (D) quadrat
18. Bundling two values together into one can be considered as
(A) Pair (B) Triplet (C) single (D) quadrat
19. Which of the following allow to name the various parts of a multi-item object?
(A) Tuples (B) Lists (C) Classes (D) quadrats
20. Which of the following is constructed by placing expressions within square brackets?
(A) Tuples (B) Lists (C) Classes (D) quadrats
CHAPTER 3
21. Which of the following refers to the visibility of variablesin one part of a program to
another part of the same program. (A) Scope (B) Memory (C) Address (D) Accessibility
22. The process of binding a variable name with an object is called
(A) Scope (B) Mapping (C) late binding (D) early binding
23. Which of the following is used in programming languages to map the variable and
object? (A) :: (B) := (C) = (D) ==
24. Containers for mapping names of variables to objects is called
(A) Scope (B) Mapping (C) Binding (D) Namespaces
25. Which scope refers to variables defined in current function?
(A) Local Scope (B) Global scope (C) Module scope (D) Function Scope
26. The process of subdividing a computer program into separate sub-programs is called
(A) Procedural Programming (B) Modular programming
(C) Event Driven Programming (D) Object oriented Programming
27. Which of the following security technique that regulates who canuse resources in a
computing environment?
(A) Password (B)Authentication (C) Access control (D) Certification
28. Which of the following members of a class can be handled only from within the class?
(A)Public members (B)Protected members (C) Secured members (D) Private members
29. Which members are accessible from outside the class?
(A)Public members (B)Protected members (C) Secured members (D) Private members
30 . The members that are accessible from within the class and are also available to its
sub-classes is called
(A) Public members (B)Protected members C) Secured members (D) Private members
CHAPTER 4
31. The word comes from the name of a Persian mathematician Abu Ja’far
Mohammed ibn-i Musa al Khowarizmi is called?
(A) Flowchart (B) Flow (C) Algorithm (D) Syntax
32. From the following sorting algorithms which algorithm needs the minimum number of
swaps? (A) Bubble sort (B) Quick sort (C) Merge sort (D) Selection sort
33. Two main measures for the efficiency of an algorithm are (A) Processor and memory
(B) Complexity and capacity (C) Time and space (D) Data and space
34. The complexity of linear search algorithm is
(A) O(n) (B) O(log n) (C) O(n2) (D) O(n log n)
35. From the following sorting algorithms which has the lowest worst case complexity?
(A) Bubble sort (B) Quick sort (C) Merge sort (D) Selection sort
36. Which of the following is not a stable sorting algorithm?
(A) Insertion sort (B) Selection sort (C) Bubble sort (D) Merge sort
37. Time complexity of bubble sort in best case is
(A) θ (n) (B) θ (nlogn) (C) θ (n2) (D) θ (n(logn) 2
38. The Θ notation in asymptotic evaluation represents
(A) Base case (B) Average case (C) Worst case (D) NULL case
39. If a problem can be broken into subproblems which are reused several times, the
problem possesses which property?
(A) Overlapping subproblems (B) Optimal substructure (C) Memoization (D) Greedy
40. In dynamic programming, the technique of storing the previously calculated values is
called ? (A) Saving value property (B) Storing value property (C) Memoization (D) Mapping
CHAPTER 5
41. Who developed Python ? (A) Ritche B) Guido Van Rossum C) Bill Gates D) Sunder
42. The Python prompt indicates that Interpreter is ready to accept instruction.
A) >>> B) <<< C) # D) <<
43. Which of the following shortcut is used to create new Python Program ?
A) Ctrl + C B) Ctrl + F C) Ctrl + B D) Ctrl + N
44. Which of the following character is used to give comments in Python Program ?
A) # B) & C) @ D) $
45. This symbol is used to print more than one item on a single line.
(A) Semicolon(;) B) Dollor($) C) comma(,) D) Colon(:)
46. Which of the following is not a token ?
(A) Interpreter B) Identifiers C) Keyword D) Operators
47. Which of the following is not a Keyword in Python ?
A) break B) while C) continue D) operators
48. Which operator is also called as Comparative operator?
(A) Arithmetic B) Relational C) Logical D) Assignment
49. Which of the following is not Logical operator? (A) and B) or C) not D) Assignment
50. Which operator is also called as Conditional operator?
(A) Ternary B) Relational C) Logical D) Assignment
BOOK BACK ALL ONE WORD QUESTIONS AND ANSWERS (CHAPTER 6 TO 10)
1. Which of the following activities is algorithmic in nature? (a) Assemble a bicycle.
(b) Describe a bicycle. (c) Label the parts of a bicycle. (d) Explain how a bicycle works.
2. Which of the following activities is not algorithmic in nature?(a) Multiply two numbers.
(b) Draw a kolam. (c) Walk in the park. (d) Swaping of two numbers.
3. Omitting details inessential to the task and representing only the essential
features of the task is known as
(a) specification (b) abstraction (c) composition (d) decomposition
4. Stating the input property and the input-output relation a problem is known
(a) specification (b) statement (c) algorithm (d) definition
5. Ensuring the input-output relation is
(a) the responsibility of the algorithm and the right of the user.
(b) the responsibility of the user and the right of the algorithm.
(c) the responsibility of the algorithm but not the right of the user.
(d) the responsibility of both the user and the algorithm.
6. If i = 5 before the assignment i := i-1 after the assignment, the value of i is
(a) 5 (b) 4 (c) 3 (d) 2
7. If 0 < i before the assignment i := i-1 after the assignment, we can conclude that
(a) 0 < i (b) 0 ≤ i (c) i = 0 (d) 0 ≥i
CHAPTER 7
1. Suppose u, v = 10 ,5 before the assignment. What are the values of u and v after the
sequence of assignments?
1 u := v
2 v := u
(a) u, v = 5 ,5 (b) u, v = 5 ,10 (c) u, v = 10 ,5 (d) u, v = 10 ,10
2. Which of the following properties is true after the assignment (at line 3?
1 --i, j = 0, 0
2 i, j := i+1, j-1
3 -- ?
(a) i+j >0 (b) i+j < 0 (c) i+j =0 (d) i = j
3. If C1 is false and C2 is true, the compound statement
1 if C1
2 S1
3 else
4 if C2
5 S2
6 else
7 S3
Executes (a) S1 (b) S2 (c) S3 (d) none
4. If C is false just before the loop, the control flows through
1 S1
2 while C
3 S2
4 S3
(a) S1 ; S3 (b) S1 ; S2 ; S3 (c)S1 ; S2 ; S2 ; S3 (d) S1 ; S2 ; S2 ; S2 ; S3
6. How many times the loop is iterated?
i := 0
while i ≠ 5
i := i + 1
(a) 4 (b) 5 (c) 6 (d) 0
CHAPTER 8
1. A loop invariant need not be true (a) at the start of the loop. (b) at the start of each iteration
(c) at the end of each iteration (d) at the start of the algorithm
2. We wish to cover a chessboard with dominoes, the number of black squares and
the number of white squares covered by dominoes, respectively, placing a domino can
be modeled by(a) b := b + 2 (b) w := w + 2 (c) b, w := b+1, w+1 (d) b := w
3. If m x a + n x b is an invariant for the assignment a, b : = a + 8, b + 7, the values of m
and n are (a) m = 8, n = 7 (b) m = 7, n = -8 (c) m = 7, n = 8 (d) m = 8, n = -7
4. Which of the following is not an invariant of the assignment?
m, n := m+2, n+3 (a) m mod 2 (b) n mod 3 (c) 3 X m - 2 X n (d) 2 X m - 3 X n
CHAPTER 9
1. How many categories of data types are available in C++?(a) 5 (b) 4 (c) 3 (d) 2
2. Which of the following data types is not a fundamental type?
(a) signed (b) int (c) float (d) char
3. What will be the result of following statement?
char ch= ‘B’;
cout << (int) ch; (a) B (b) b (c) 65 (d) 66
4. Which of the character is used as suffix to indicate a floating point value?
(a) F (b) C (c) L (d) D
5. How many bytes of memory is allocated for the following variable declaration if you are
using Dev C++? short int x; (a) 2 (b) 4 (c) 6 (d) 8
6. What is the output of the following snippet?
char ch = ‘A’;
ch = ch + 1; (a) B (b) A1 (c) F (d) 1A
7. Which of the following is not a data type modifier? (a) signed (b) int (c) long (d) short
8. Which of the following operator returns the size of the data type?
(a) sizeof( ) (b) int ( ) (c) long ( ) (d) double ( )
9. Which operator is used to access reference of a variable? (a) $ (b) # (c) & (d) !
10. This can be used as alternate to endl command: (a) \t (b) \b (c) \0 (c) \n
CHAPTER 10
1. What is the alternate name of null statement? (A) No statement (B) Empty statement
(C) Void statement (D) Zero statement
2. In C++ the group of statements should be enclosed within:(A) { } (B) [ ] (C) ( ) (D) < >
3. The set of statements that are executed again and again in iteration is called as:
(A) condition (B) loop (C) statement (D) body of loop
4. The multi way branch statement:(A) if (B) if … else (C) switch (D) for
5. How many types of iteration statements? (A) 2 (B) 3 (C) 4 (D) 5
6. How many times the following loop will execute? for (int i=0; i<10; i++)
(A) 0 (B) 10 (C) 9 (D) 11
7. Which of the following is the exit control loop?
(A) for (B) while (C) do…while (D) if…else
8. Identify the odd one from the keywords of jump statements:
(A) break (B) switch (C) goto (D) continue
9. Which of the following is called entry control loop?
(A) do-while (B) for (C) while (D) if-else
10. A loop that contains another loop inside its body:
(A) Nested loop (B) Inner loop (C) Inline loop (D) Nesting of loop