Textbook MCQ with Answers CH-13 Other useful free tools and services
1. Which of the following refers to a file that has an entire directory structure inside it?
a. Apache
b. Archie
c. Archi
d. Archive
2. What is the full form of tar?
a. Tape Archiver
b. Tech Archiver
c. Test Archiver
d. Tight Archiver
3. For which types of archives is the password protection option available?
a. zip
b. tar
c. tar.gz
d. Both zip and tar.gz
4. Which of the following is a feature-rich media player?
a. VAC
b. VEC
c. VLC
d. VNC
5. What is the full form of VLC?
a. Video LAN Client
b. Video Line Coder
c. Video Length Coder
d. Video List Creator
6. Which technology gives out location with accuracy?
a. GRS
b. GPRS
c. GRPS
d. GPS
7. Which program is used to enter Unicode character into any application?
a. Character Display
b. Character Insert
c. Character Map
d. Character Select
8. Which command is used to quit from R?
a. quit()
b. q()
c. exit()
d. close()
9. Which function is used to create a bar graph in R ?
a. bar()
b. plot()
c. bargraph()
d. barplot()
10. Which of the following are different variants of Rational Plan?
a. Single, Multi, Viewer
b. Singular, Multiple
c. View, Preview
d. Server, Client
Textbook MCQ with Answers CH-12 Publishing Documents using LaTeX
1. Modern word processing software operates in which of the following mode?
a. WIGIWIS
b. WISYWIG
c. WYSIWYG
d. WISYWYG
2. Which of the following is not a reserved character in LaTeX?
a. @
b. %
c. $
d. ^
3. Which of the following begins with \begin {name} and ends with \end {name}?
a. group
b. section
c. environment
d. preamble
4. Which of the following character is used to mark a comment in LaTeX?
a. $
b. %
c. #
d. &
5. Which of the following part of the LaTeX document contains the metadata?
a. Preface
b. TOC
c. Preamble
d. Environment
6. Which of the following web site hosts the LaTeX packages?
a. CTAN
b. CLAN
c. CTEN
d. CLEN
7. Which of the following will not be automatically numbered?
a. \section
b. \subsection
c. \chapter*
d. \part
8. Which of these environments displays mathematical content inline with the text?
a. displaymath
b. math
c. equation
d. text
9. Which of the following commands generate the set union symbol?
a. \cup
b. \setunion
c. \cap
d. \union
10. Which of the following operator is used to denote a subscript or an index?
a. _ (Underscore)
b. ^ (Caret)
c. – (Minus)
d. < (Less than)
11. Which of the following refer to the very first line in the preamble?
a. \usepackage
b. \title
c. \maketitle
d. \documentclass
Textbook MCQ with Answers CH-11 File Handling
1. Which of the following statements is true?
a. Volatile storage lasts only a few seconds.
b. Volatile storage is lost when a computer is shutdown.
c. Computer disks are volatile storage devices.
d. All of these
2. Which of the following refers to a collection of data stored on a non-volatile device in a Computer system?
a. File
b. application
c. volatile data (d)
d. hard disk
3. The data hierarchy occurs in which of the following order from the smallest to largest?
a. file : character : field : record
b. file : character : record : field
c. character : field : file : record
d. character : field : record : file
4. Which of the following is true about streams?
a. Streams always flow in two directions
b. Streams are channels through which the data flow
c. Only one stream can be open in a program at a time.
d. All of these
5. Which of the following is used as a separator between fields of a record?
a. Path
b. delimiter
c. variable
d. space
6. Scanner class can be used to for performing which of the following operations?
a. accept input from the keyboard
b. read from the file
c. Parse a string separated by delimiters
d. All of these
1. Which of the following refers to an error condition in object-oriented programming Terminology?
a. Anomaly
b. abbreviation
c. exception
d. deviation
2. Which of the following is a correct word for all Java Exceptions?
a. Errors
b. Runtime Exceptions
c. Throwables
d. Omissions
3. Which of the following statements is true?
a. Exceptions are more serious than Errors.
b. Errors are more serious than Exceptions.
c. Errors and Exceptions are equally serious.
d. Exceptions and Errors are the same things.
4. Which of the following elements is not included in try block?
a. the keyword try
b. the keyword catch
c. the curly braces
d. statements that might cause Exceptions
5. Which of the following block handles or takes appropriate action when an Exception Occurs?
a. try
b. catch
c. throws
d. handles
6. Which of the following should be within a catch block?
a. finally block
b. single statement that handles Exception
c. any number of statements to handle Exception
d. throws keyword
7. What will happen when a try block does not generated an Exception and you have included multiple catch blocks?
a. they all execute
b. only the first matching one executes
c. no catch block executes
d. only the first catch block executes
8. Which of the following is an advantage of using a try ..... catch block?
a. Exceptional events are eliminated.
b. Exceptional events are reduced.
c. Exceptional events are integrated with regular events.
d. Exceptional events are isolated from regular events.
9. Which of the following methods can throw an Exception?
a. methods with throws clause
b. methods with a catch block
c. methods with a try block
d. methods with finally block
10. Which of the following is least important to know if you want to be able to use a method to its full potential?
a. the method’s return type
b. the type of arguments the method requires
c. the number of statements within the method
d. the type of Exceptions the method throw
Textbook MCQ with Solution CH-09 Working with Array and String
1. Which of the following refer to the starting index value in arrays?
a. 0
b. 1
c. Null
d. All of these
2. What is the size of second dimension in an array sales [5] [12]?
a. 5
b. 12
c. 60
d. 10
3. What will expression sales.length return for an array sales [5] [12]?
a. 5
b. 12
c. 60
d. 120
4. When an array sales [5] [12] is declared without specifying initial values, what is the initial value of sale [0] [0] ?
a. 0
b. default value
c. compilation error
d. 60
5. What does ‘length’ refer to for an object of String class?
a. attribute
b. method
c. class variable
d. class name
6. If ‘str’ is the object of String class and its content is “Thank GOD”, then what is the value of str.length()?
a. 9
b. 10
c. 8
d. 11
7. What type of value is returned when we use get method of Calendar class with constant DAY_OF_WEEK as an argument?
a. int
b. char
c. string
d. boolean
Textbook MCQ with Solution: Chapter 8 Classes and Objects in Java
1. Which of the following defines attributes and methods?
a. Class
b. Object
c. Instance
d. Variable
2. Which of the following keyword is used to declare Class variables and class methods?
a. static
b. private
c. public
d. package
3. Which of the following operator creates an object and returns its reference?
a. dot (.)
b. new
c. colon (:)
d. assignment (=)
4. Which of the following method can be called without creating an instance of a class?
a. Instance method
b. Class method
c. Constructor method
d. All of these
5. Which of the following refers more than one method having same name but different
parameters?
a. Overloaded methods
b. Overridden methods
c. Duplicate methods
d. All of these
6. Which method is invoked automatically with creation of an object?
a. Instance method
b. Constructor
c. Class method
d. All of these
7. Which of the following is the keyword used to refer a superclass constructor in subclass
constructor?
a. extends
b. super
c. name of the superclass
d. new
8. Which of the following is used to invoke an instance method in Java?
a. The name of the object, colon (:) and the name of the method
b. The name of the object, dot (.) and the name of the method
c. The name of the class, colon (:) and the name of the method
d. The name of the class, dot (.) and the name of the method
9. Which of the following is accessible by instance methods?
a. Only instance variables
b. Only class variables
c. Both (A) and (B)
d. None of these (d)
10. When methods in the superclass and subclass have same name and signature, what are
they called ?
a. Overloaded methods
b. Overridden methods (b)
c. Inherited methods
d. All of these
1. How many basic (primitive) data types are supported in Java?
a. 2
b. 4
c. 8
d. 16
2. What is the default data type of floating point literal?
a. int
b. long
c. float
d. double
3. Which character set is used for char data type in Java?
a. Unicode
b. ASCII
c. EBCIDIC
d. All of these
4. Which of the following is compiled error free?
a. for (;;) {int i=7}
b. while (1) {int i=7}
c. while (True) {int i = 7}
d. All of these
5. Which of the following is not allowed as first character in valid variable name?
a. Underscore (_)
b. Digit
c. Letter
d. Dollar ($)
6. Which of the following is not a basic data type in Java?
a. char
b. long
c. byte
d. String
7. What is the default value of Boolean type data?
a. null
b. true
c. false
d. 0
8. What will be the result of arithmetic expression 7/2?
a. 3
b. 3.5
c. 1
d. 0
9. What will be the result of arithmetic expression –7%2 ?
a. –3
b. –1
c. 1
d. –3.5
10. What will be the result of arithmetic expression –7.5%2 ?
a. –3
b. –1.5
c. 1.5
d. Error
1. In Object-oriented methodology, the focus in on which of the following entities?
(A) Data
(B) Functions
(C) Object
(D) All of these
2. Which of the following best suits to Java?
(A) A procedural programming language
(B) An Object-oriented programming language
(C) A Query language
(D) All of these
3. Which of the following is used to distinguish objects from each other?
(A) Attributes
(B) State
(C) Behavior
(D) All of these
4. Which of the following is used to define common features of similar objects?
(A) Class
(B) Object
(C) Methods
(D) All of these
5. Which of the following is not a visibility symbol?
(A) ~
(B) *
(C) #
(D) –
6. Which of the following is provided using encapsulation?
(A) Data protection
(B) Data sharing
(C) Separation of data and methods
(D) All of these
7. Which of the following is enabled by data abstraction?
(A) Data protection
(B) Data hiding
(C) To hide implementation details of method manipulating the data
(D) All of these
8. With which of the following options polymorphism cannot be achieved?
(A) Method overloading
(B) Operator overloading
(C) Data hiding
(D) All of these
9. An aggregation model refers to which of the following relationships?
(A) ‘is –a’ relationship
(B) ‘is – like’ relationship
(C) ‘a – part – of’ relationship
(D) All of these
10. An inheritance model refers to which of the following relationships?
(A) ‘is –a’ relationship
(B) ‘has-a’ relationship
(C) ‘a – part – of’ relationship
(D) All of these
11. In class diagram, composition is represented using which of the following symbols?
(A) Empty diamond symbol
(B) Filled diamond symbol
(C) Empty triangle symbol
(D) All of these
Textbook MCQ with Solution CH-05 Introduction to M-Commerce
1. Which of the following refers to buying and selling of goods or services through the use of Internet enabled wireless devices?
(A) Internet
(B) M – Commerce
(C) M – Banking
(D) WWW
2. Which of the following is the use of technologies which provide the location information for business purpose?
(A) E – Commerce
(B) M – Commerce
(C) L – Commerce
(D) Traditional Commerce
3. Which of the following stands for GPS?
(A) Global Positioning System
(B) Global Postal System
(C) Grand Positioning System
(D) Google Positioning System
4. Which of the following security aspect refers to the secrecy of the information so that unauthorized user cannot read it?
(A) Confidentiality
(B) Integrity
(C) Non – repudiation
(D) Authorization
5. Which of the following security aspect ensures that the information must not be
accidentally or maliciously altered or tampered in transit ?
(A) Confidentiality
(B) Integrity
(C) Non-repudiation
(D) Authorization
6. Which of the following security aspect ensures that only authentic users are allowed to use the system?
(A) Authorization
(B) Confidentiality
(C) Non-repudiation
(D) Integrity
7. Which of the following security aspect ensures that the sender of the message cannot deny that he/she has sent the message?
(A) Authorization
(B) Confidentiality
(C) Non-repudiation
(D) Integrity
8. Which of the following is a program that uses Internet to record information that passes through a computer or router in transit from sender to receiver?
(A) Sniffer
(B) Denial of service attack
(C) Malicious code
(D) Spoofing
9. Which of the following is an attack used to shut down a machine or network, making it inaccessible to its intended users?
(A) Malicious code
(B) Denial of service
(C) Spoofing
(D) Cyber vandalism
10. Which of the following is known as electronic defacing of an existing website page?
(A) Cyber vandalism
(B) Denial of service
(C) Spoofing
(D) Malicious code
11. Which of the following is pretending to be someone you are not, or representing a website as authentic when it is actually a fake?
(A) Cyber vandalism
(B) Malicious code
(C) Denial of service
(D) Spoofing
12. Which of the following is a computer program that detects, prevents and takes action to remove the malicious codes like viruses, worms and Trojan horses from the infected system?
(A) Antivirus software
(B) Digital certificate
(C) Firewall
(D) Cryptography
13. Which of the following is the transformation of normal text known as “plain text” into unreadable or secret text known as “chipper text” using encryption algorithm?
(A) Firewall
(B) Encryption
(C) Antivirus software
(D) Digital certificate
14. Which of the following is the transformation of encrypted text back into normal text?
(A) Firewall
(B) Digital certificate
(C) Decryption
(D) Virus
15. Which of the following is a protocol used for securing web transactions on the Internet?
(A) TCP/IP
(B) HTTP
(C) Bluetooth
(D) SSL
16. Who developed SSL protocol?
(A) Google
(B) Netscape
(C) Yahoo
(D) Firefox
17. Which of the following starting address indicates that site is secured by SSL protocol?
(A) http://
(B) ssl://
(C) https://
(D) http-ssl://
18. Which of the following provides the author with a tool to protect his/her original work from being used or taken by others without permission ?
(A) Trademark
(B) Copyright
(C) Digital watermarking
(D) Steganography
19. Which of the following is a specific logo, mark, word, symbol, design, phrase or image which is used by an individual or a company to distinguish a product or service from that of others in the market?
(A) Trademark
(B) Copyright
(C) Digital watermarking
(D) Steganography
20. Which of the following is the symbol for trademark?
(A) TM, MT and ©
(B) TM, MS and ®
(C) TM, SM and ®
(D) TM, SM and ©
21. Which of the following is the process of hiding information within other information?
(A) Squatting
(B) Steganography
(C) Name changing
(D) Copyright
22. Which of the following is a digital code inserted into a digital image, audio or video file which can identify the file’s copyright information?
(A) Image mark
(B) Digital mark
(C) Code mark
(D) Water mark
23. Who issues the credit card and guarantees the payment to the merchant?
(A) Merchant
(B) Issuing bank
(C) Acquiring bank
(D) Customer
24. Which of the following payment card has a microchip embedded in its surface?
(A) Smart card
(B) Debit card
(C) Credit card
(D) Charge card
1. Which of the following is an example for online bookstore?
A. Amazon
B. IRCTC
C. Gmail
D. Yahoo
2. Which of the following is newspaper that exists on the Internet in digital form?
A. I – Newspaper
B. Internet Newspaper
C. WWW – Newspaper
D. E – Newspaper
3. Which of the following is the process of buying and selling products by offering the customers to bid the price?
A. Marketing
B. Auction
C. Bookshop
D. Booking
4. Which of the following is known as the process of conducting the banking transactions over the Internet?
A. Auction
B. Bidding
C. Net banking
D. WWW banking
5. Which of the following is a feature of traditional commerce?
A. Operates within a certain period of time or during business hours.
B. Advertising of the product is done electronically.
C. E-payment systems are used for receiving payment.
D. Customers can browse through products and offers.
6. Which of the following is a feature of E-Commerce?
A. Operates within a certain period of time or during business hours.
B. No sharing of information with competitors.
C. Location renting or purchasing.
D. Advertising of the product is done electronically.
7. Which of the following is not an advantage of E-Commerce?
A. Lower cost
B. Conduct business 24 x 7
C. Security
D. No geographical limitations
8. Which of the following is a disadvantage of E-Commerce?
A. Privacy
B. Improved customer service
C. Speed
D. Conduct business 24 x 7
9. Which of the following E-Commerce business model refers to business and organizations that sell products or services to consumers over the Internet using websites ?
A. Business to Consumer (B2C)
B. Business to Business (B2B)
C. Consumer to Business (C2B)
D. Government to Business (G2B)
10. Which of the following E-Commerce business model refers to activities between different business partners?
A. Government to Business (G2B)
B. Consumer to Business (C2B)
C. Business to Business (B2B)
D. Business to Consumer (B2C)
11. Which of the following is a good example of C2C model?
A. Auction sites
B. E – Newspaper
C. Online purchasing
D. Information services
12. Which of the following E-Commerce business model refers to E-Commerce activities involving transactions between and among the consumers?
A. Government to Business (G2B)
B. Consumer to Consumer (C2C)
C. Business to Business (B2B)
D. Business to Consumer (B2C)
13. Which of the following E-Commerce business model involves reverse auctions where the consumers determine the prices of the products or services?
A. Consumer to Business (C2B)
B. Business to Business (B2B)
C. Consumer to Consumer (C2C)
D. Government to Business (G2B)
14. Which of the following E-Commerce business model is also a part of E-Governance?
A. Business to Business (B2B)
B. Consumer to Business (C2B)
C. Consumer to Consumer (C2C)
D. Government to Citizen (G2C)
15. Which of the following E-Commerce business model refers to online non-commercial communication between the Government agencies, organizations and departments with other Government agencies, organizations and departments?
A. Business to Business (B2B)
B. Consumer to Business (C2B)
C. Government to Government (G2G)
D. Consumer to Consumer (C2C)
Textbook MCQ with Solution CH-03 Designing Simple Website using KompoZer
1. Which of the following helps in promoting the business, selling the products and attracting a large number of customers?
A. Website
B. Webpage
C. Form
D. CSS
2. Which of the following is not an important point to be considered for developing a good website as part of planning process?
A. Purpose
B. Audience
C. Content
D. Input
3. Which of the following information should a website contain?
A. Complete, Relevant
B. Complete, Irrelevant
C. Incomplete, Irrelevant
D. Incomplete, Relevant
4. Which of the following content provides an overview of the size, organization, products and services, and other items?
A. Detailed
B. Long
C. General
D. Short
5. Which of the following is a collection of interlinked web pages?
A. Webpage
B. Form
C. KompoZer
D. Website
6. Which of the following is the first page that opens when the user enters the URL address in the address bar of the browser?
A. Home page
B. Last page
C. Web page
D. First page
7. Which of the following filename is the home page of the website saved as?
A. first.html
B. index.html
C. home.html
D. one.html
8. Which of the following is a variable that is stored on the user’s computer?
A. Integer
B. HTML
C. Cookie
D. Java
9. Which of the following stands for FTP?
A. File Truncate Protocol
B. File Transfer Process
C. Fine Tune Protocol
D. File Transfer Protocol
Textbook MCQ with Solution CH-02: Cascading Style Sheets and Java Script
1. Which of the following allows specifying styles for the visual elements of the website?
A. Cascading Style Sheets
B. Webpage
C. Form
D. Animation
2. Which of the following is known as special symbol in the syntax of CSS?
A. Rules
B. Selector
C. Declaration
D. Input
3. Which of the following are two main parts of CSS rule?
A. Selector, Declaration
B. Select, Declaration
C. Selector, Declare
D. Selection, Declaration
4. Which of the following is an HTML element on which style can be applied?
A. Declaration
B. Selector
C. Select
D. Declare
5. Which of the following is the syntax of CSS?
A. select {property : value}
B. selector {value : property}
C. selector {property : value}
D. selection {property : value}
6. Which of the following has developed JavaScript?
A. Yahoo
B. Google
C. Wikipedia
D. Netscape
7. Which of the following is a scripting language that allows adding programming to web
pages?
A. Action script
B. Java Script
C. HTML
D. CSS
8. Which of the following is a scripting language that is simple, lightweight programming
language that does not contain advanced programming functionalities?
A. Java Script
B. HTML
C. C
D. Java
9. Which of the following tag is used to insert JavaScript code into an HTML page?
A. <script> ..... <script>
B. <script> .... </script>
C. <script> ..... <//script>
D. </script> ..... </script>
10. Which of the following symbol signifies the start and end of a JavaScript block?
A. Semicolon
B. Square bracket
C. Curtly bracket
D. Round bracket
11. Which of the following is a reusable block of code that performs a particular task?
A. Array
B. Code
C. Program
D. Function
12. Which of the following statement is used to return a value in a function?
A. Return
B. Function
C. Select
D. Send
13. Which of the following is generated by the browser due to interaction between the user and the web page?
A. Function
B. Response
C. Event
D. Value
14. Which of the following is not an event?
A. Abort
B. Mouse Over
C. Set
D. Load
15. Which of the following is a container for storing data?
A. Variable
B. Integer
C. Event
D. Event handler
16. Which of the following stands for BOM?.
A. Browser Of Model
B. Browser Object Model
C. Browser Object Modeling
D. Browser Object Model
17. Which of the following is the top level object in the browser object model?
A. Window
B. Document
C. Page
D. Location
18. Which of the following stands for NaN?
A. Not a Numeric
B. Not a Number
C. Not a Noun
D. Not an Numeric
Textbook Solution for Chapter:1 Creating HTML forms using KompoZer
1. Which of the following is a container used to collect different kinds of inputs from the user?
a. Form
b. Webpage
c. Text
d. Input
2. Which of the following element is used to create an HTML form?
a. Textarea
b. Form
c. Select and Option
d. Input
3. Which of the following is the tag used to implement form element?
a. <form> ..... </form>
b. <form> ..... <form>
c. </form> ..... </form>
d. <frm> ..... </frm>
4. Which of the following attribute of form is used to specify where to send the form data when the form is submitted?
a. Method
b. Action
c. Submit
d. Input
5. Which of the following attribute of form specifies the HTTP method to be used when sending the data?
a. Submit
b. Action
c. Method
d. Input
6. Which of the following values are used by method attribute?
a. GET and POST
b. GET and SET
c. GET and PUT
d. SET and POST
7. Which of the following method allows only a limited amount of information to be sent at a time?
a. GET
b. POST
c. SET
d. PUT
8. Which of the following method sends the data as a block through the HTTP transaction?
a. GET
b. SET
c. PUT
d. POST
9. Which of the following attribute of the input element specifies the field that is to be created in the form?
a. Input
b. Type
c. Name
d. Value
10. Which of the following element allows multi-line text input?
a. Textarea
b. Input
c. Select and Option
d. Form
11. Which of the following element is used in form to create drop-down list or menu?
a. Input
b. Textarea
c. Select
d. Form
12. Which of the following is a free open source web development IDE?
a. HTML
b. KompoZer
c. SciTE
d. Base
13. Which of the following stands for “WYSIWYG”?
a. When You See Is When You Get
b. What You See Is When You Get
c. What You See Is What You Get
d. When You See Is What You Get