Showing posts with label standrad:12. Show all posts

STD-12 Computer Textbook Solution CH-13 Other useful free tools and services

Textbook MCQ with Answers CH-13 Other useful free tools and services

1. Which of the following refers to a file that has an entire directory structure inside it?
a. Apache         
b. Archie        
c. Archi         
d. Archive

2. What is the full form of tar?
a. Tape Archiver     
b. Tech Archiver    
c. Test Archiver     
d. Tight Archiver

3. For which types of archives is the password protection option available?
a. zip         
b. tar            
c. tar.gz         
d. Both zip and tar.gz

4. Which of the following is a feature-rich media player?
a. VAC         
b. VEC        
c. VLC         
d. VNC

5. What is the full form of VLC?
a. Video LAN Client             
b. Video Line Coder
c. Video Length Coder             
d. Video List Creator

6. Which technology gives out location with accuracy?
a. GRS         
b. GPRS        
c. GRPS         
d. GPS

7. Which program is used to enter Unicode character into any application?
a. Character Display             
b. Character Insert
c. Character Map                 
d. Character Select

8. Which command is used to quit from R?
a. quit()         
b. q()            
c. exit()         
d. close()

9. Which function is used to create a bar graph in R ?
a. bar()         
b. plot()        
c. bargraph()     
d. barplot()

10. Which of the following are different variants of Rational Plan?
a. Single, Multi, Viewer            
b. Singular, Multiple
c. View, Preview                 
d. Server, Client

Std 12 Computer Textbook Solution CH-12 Publishing Documents using LaTeX

Textbook MCQ with Answers CH-12 Publishing Documents using LaTeX

1. Modern word processing software operates in which of the following mode?
a. WIGIWIS         
b. WISYWIG        
c. WYSIWYG         
d. WISYWYG

2. Which of the following is not a reserved character in LaTeX?
a. @             
b. %            
c. $                 
d. ^

3. Which of the following begins with \begin {name} and ends with \end {name}?
a. group         
b. section        
c. environment         
d. preamble

4. Which of the following character is used to mark a comment in LaTeX?
a. $             
b. %            
c. #                 
d. &

5. Which of the following part of the LaTeX document contains the metadata?
a. Preface         
b. TOC        
c. Preamble             
d. Environment

6. Which of the following web site hosts the LaTeX packages?
a. CTAN         
b. CLAN        
c. CTEN             
d. CLEN

7. Which of the following will not be automatically numbered?
a. \section         
b. \subsection    
c. \chapter*         
d. \part

8. Which of these environments displays mathematical content inline with the text?
a. displaymath     
b. math        
c. equation             
d. text

9. Which of the following commands generate the set union symbol?
a. \cup         
b. \setunion        
c. \cap             
d. \union

10. Which of the following operator is used to denote a subscript or an index?
a. _ (Underscore)     
b. ^ (Caret)        
c. – (Minus)             
d. < (Less than)

11. Which of the following refer to the very first line in the preamble?
a. \usepackage     
b. \title        
c. \maketitle         
d. \documentclass

Std 12 Computer Textbook Solution CH-11 File Handling

Textbook MCQ with Answers CH-11 File Handling

1. Which of the following statements is true?
a. Volatile storage lasts only a few seconds.
b. Volatile storage is lost when a computer is shutdown.
c. Computer disks are volatile storage devices.
d. All of these

2. Which of the following refers to a collection of data stored on a non-volatile device in a Computer system?
a. File       
b. application         
c. volatile data (d)        
d. hard disk

3. The data hierarchy occurs in which of the following order from the smallest to largest?
a. file : character : field : record             
b. file : character : record : field
c. character : field : file : record             
d. character : field : record : file

4. Which of the following is true about streams?
a. Streams always flow in two directions
b. Streams are channels through which the data flow
c. Only one stream can be open in a program at a time.
d. All of these

5. Which of the following is used as a separator between fields of a record?
a. Path         
b. delimiter           
c. variable             
d. space

6. Scanner class can be used to for performing which of the following operations?
a. accept input from the keyboard         
b. read from the file
c. Parse a string separated by delimiters    
d. All of these

Std 12 Computer Textbook Solution CH-10 Exception Handling in Java

1. Which of the following refers to an error condition in object-oriented programming Terminology?
a. Anomaly        
b. abbreviation    
c. exception     
d. deviation

2. Which of the following is a correct word for all Java Exceptions?
a. Errors                    
b. Runtime Exceptions
c. Throwables                 
d. Omissions

3. Which of the following statements is true?
a. Exceptions are more serious than Errors.
b. Errors are more serious than Exceptions.
c. Errors and Exceptions are equally serious.
d. Exceptions and Errors are the same things.

4. Which of the following elements is not included in try block?
a. the keyword try                 
b. the keyword catch
c. the curly braces                 
d. statements that might cause Exceptions

5. Which of the following block handles or takes appropriate action when an Exception Occurs?
a. try         
b. catch        
c. throws         
d. handles

6. Which of the following should be within a catch block?
a. finally block
b. single statement that handles Exception
c. any number of statements to handle Exception
d. throws keyword

7. What will happen when a try block does not generated an Exception and you have included multiple catch blocks?
a. they all execute                 
b. only the first matching one executes
c. no catch block executes         
d. only the first catch block executes

8. Which of the following is an advantage of using a try ..... catch block?
a. Exceptional events are eliminated.
b. Exceptional events are reduced.
c. Exceptional events are integrated with regular events.
d. Exceptional events are isolated from regular events.

9. Which of the following methods can throw an Exception?
a. methods with throws clause         
b. methods with a catch block
c. methods with a try block         
d. methods with finally block

10. Which of the following is least important to know if you want to be able to use a method to its full potential?
a. the method’s return type
b. the type of arguments the method requires
c. the number of statements within the method
d. the type of Exceptions the method throw

Std 12 Computer Textbook Solution CH-09 Working with Array and String

Textbook MCQ with Solution CH-09 Working with Array and String

1. Which of the following refer to the starting index value in arrays?
a. 0             
b. 1            
c. Null         
d. All of these

2. What is the size of second dimension in an array sales [5] [12]?
a. 5             
b. 12           
c. 60             
d. 10

3. What will expression sales.length return for an array sales [5] [12]?
a. 5             
b. 12            
c. 60                
d. 120

4. When an array sales [5] [12] is declared without specifying initial values, what is the initial value of sale [0] [0] ?
a. 0             
b. default value    
c. compilation error
d. 60

5. What does ‘length’ refer to for an object of String class?
a. attribute         
b. method        
c. class variable     
d. class name

6. If ‘str’ is the object of String class and its content is “Thank GOD”, then what is the value of str.length()?
a. 9             
b. 10            
c. 8             
d. 11

7. What type of value is returned when we use get method of Calendar class with constant DAY_OF_WEEK as an argument?
a. int             
b. char        
c. string         
d. boolean

STD-12 Computer Textbook Solution CH-08 Classes and Objects in Java

Textbook MCQ with Solution: Chapter 8 Classes and Objects in Java

1. Which of the following defines attributes and methods?
a. Class         
b. Object        
c. Instance         
d. Variable

2. Which of the following keyword is used to declare Class variables and class methods?
a. static         
b. private        
c. public         
d. package

3. Which of the following operator creates an object and returns its reference?
a. dot (.)         
b. new        
c. colon (:)         
d. assignment (=)

4. Which of the following method can be called without creating an instance of a class?
a. Instance method             
b. Class method
c. Constructor method             
d. All of these

5. Which of the following refers more than one method having same name but different
parameters?
a. Overloaded methods             
b. Overridden methods
c. Duplicate methods             
d. All of these

6. Which method is invoked automatically with creation of an object?
a. Instance method             
b. Constructor
c. Class method                 
d. All of these

7. Which of the following is the keyword used to refer a superclass constructor in subclass
constructor?
a. extends                     
b. super   
c. name of the superclass         
d. new

8. Which of the following is used to invoke an instance method in Java?
a. The name of the object, colon (:) and the name of the method
b. The name of the object, dot (.) and the name of the method
c. The name of the class, colon (:) and the name of the method
d. The name of the class, dot (.) and the name of the method

9. Which of the following is accessible by instance methods?
a. Only instance variables         
b. Only class variables
c. Both (A) and (B)                
d. None of these (d)

10. When methods in the superclass and subclass have same name and signature, what are
they called ?
a. Overloaded methods             
b. Overridden methods (b)
c. Inherited methods            
d. All of these

STD-12 Computer Textbook Solution CH-07 Java Basics

1. How many basic (primitive) data types are supported in Java?
a. 2                 
b. 4            
c.  8                
d. 16

2. What is the default data type of floating point literal?
a. int             
b. long        
c. float             
d. double

3. Which character set is used for char data type in Java?
a. Unicode            
b. ASCII        
c. EBCIDIC            
d. All of these

4. Which of the following is compiled error free?
a. for (;;) {int i=7}                     
b. while (1) {int i=7}
c. while (True) {int i = 7}                 
d. All of these

5. Which of the following is not allowed as first character in valid variable name?
a. Underscore (_)         
b. Digit        
c. Letter             
d. Dollar ($)

6. Which of the following is not a basic data type in Java?
a. char             
b. long        
c. byte             
d. String

7. What is the default value of Boolean type data?
a. null             
b. true        
c. false             
d. 0

8. What will be the result of arithmetic expression 7/2?
a. 3                 
b. 3.5            
c. 1                 
d. 0

9. What will be the result of arithmetic expression –7%2 ?
a. –3                 
b. –1            
c. 1                
d. –3.5

10. What will be the result of arithmetic expression –7.5%2 ?
a. –3                 
b. –1.5        
c. 1.5                         
d. Error


STD-12 Computer Textbook Solution CH-06 Object Oriented Concepts

1. In Object-oriented methodology, the focus in on which of the following entities?
(A) Data         
(B) Functions            
(C) Object             
(D) All of these

2. Which of the following best suits to Java?
(A) A procedural programming language     
(B) An Object-oriented programming language
(C) A Query language                 
(D) All of these

3. Which of the following is used to distinguish objects from each other?
(A) Attributes     
(B) State            
(C) Behavior            
(D) All of these

4. Which of the following is used to define common features of similar objects?
(A) Class         
(B) Object            
(C) Methods         
(D) All of these

5. Which of the following is not a visibility symbol?
(A) ~             
(B) *                
(C) #                 
(D) –

6. Which of the following is provided using encapsulation?
(A) Data protection                    
(B) Data sharing
(C) Separation of data and methods        
(D) All of these

7. Which of the following is enabled by data abstraction?
(A) Data protection
(B) Data hiding
(C) To hide implementation details of method manipulating the data
(D) All of these

8. With which of the following options polymorphism cannot be achieved?
(A) Method overloading                
(B) Operator overloading
(C) Data hiding                     
(D) All of these

9. An aggregation model refers to which of the following relationships?
(A) ‘is –a’ relationship             
(B) ‘is – like’ relationship
(C) ‘a – part – of’ relationship             
(D) All of these

10. An inheritance model refers to which of the following relationships?
(A) ‘is –a’ relationship                
(B) ‘has-a’ relationship
(C) ‘a – part – of’ relationship              
(D) All of these

11. In class diagram, composition is represented using which of the following symbols?
(A) Empty diamond symbol            
(B) Filled diamond symbol
(C) Empty triangle symbol                 
(D) All of these

STD-12 Computer Textbook Solution CH-05 Introduction to M-Commerce

Textbook MCQ with Solution CH-05 Introduction to M-Commerce

1. Which of the following refers to buying and selling of goods or services through the use of Internet enabled wireless devices?
(A) Internet         
(B) M – Commerce        
(C) M – Banking     
(D) WWW

2. Which of the following is the use of technologies which provide the location information for business purpose?
(A) E – Commerce                     
(B) M – Commerce        
(C) L – Commerce                     
(D) Traditional Commerce

3. Which of the following stands for GPS?
(A) Global Positioning System             
(B) Global Postal System
(C) Grand Positioning System             
(D) Google Positioning System

4. Which of the following security aspect refers to the secrecy of the information so that unauthorized user cannot read it?
(A) Confidentiality                     
(B) Integrity    
(C) Non – repudiation                  
(D) Authorization

5. Which of the following security aspect ensures that the information must not be
accidentally or maliciously altered or tampered in transit ?
(A) Confidentiality      
(B) Integrity        
(C) Non-repudiation                
(D) Authorization

6. Which of the following security aspect ensures that only authentic users are allowed to use the system?
(A) Authorization                      
(B) Confidentiality
(C) Non-repudiation                 
(D) Integrity

7. Which of the following security aspect ensures that the sender of the message cannot deny that he/she has sent the message?
(A) Authorization     
(B) Confidentiality    
(C) Non-repudiation    
(D) Integrity

8. Which of the following is a program that uses Internet to record information that passes through a computer or router in transit from sender to receiver?
(A) Sniffer                         
(B) Denial of service attack
(C) Malicious code                     
(D) Spoofing

9. Which of the following is an attack used to shut down a machine or network, making it inaccessible to its intended users?
(A) Malicious code    
(B) Denial of service                
(C) Spoofing            
(D) Cyber vandalism

10. Which of the following is known as electronic defacing of an existing website page?
(A) Cyber vandalism       
(B) Denial of service    
(C) Spoofing         
(D) Malicious code

11. Which of the following is pretending to be someone you are not, or representing a website as authentic when it is actually a fake?
(A) Cyber vandalism                    
(B) Malicious code    
(C) Denial of service                     
(D) Spoofing

12. Which of the following is a computer program that detects, prevents and takes action to remove the malicious codes like viruses, worms and Trojan horses from the infected system?
(A) Antivirus software                
(B) Digital certificate
(C) Firewall                         
(D) Cryptography

13. Which of the following is the transformation of normal text known as “plain text” into unreadable or secret text known as “chipper text” using encryption algorithm?
(A) Firewall                         
(B) Encryption    
(C) Antivirus software                 
(D) Digital certificate

14. Which of the following is the transformation of encrypted text back into normal text?
(A) Firewall         
(B) Digital certificate        
(C) Decryption      
(D) Virus

15. Which of the following is a protocol used for securing web transactions on the Internet?
(A) TCP/IP         
(B) HTTP             
(C) Bluetooth       
(D) SSL

16. Who developed SSL protocol?
(A) Google         
(B) Netscape            
(C) Yahoo          
(D) Firefox

17. Which of the following starting address indicates that site is secured by SSL protocol?
(A) http://         
(B) ssl://            
(C) https://        
(D) http-ssl://

18. Which of the following provides the author with a tool to protect his/her original work from being used or taken by others without permission ?
(A) Trademark                    
(B) Copyright     
(C) Digital watermarking                 
(D) Steganography

19. Which of the following is a specific logo, mark, word, symbol, design, phrase or image which is used by an individual or a company to distinguish a product or service from that of others in the market?
(A) Trademark                     
(B) Copyright     
(C) Digital watermarking                 
(D) Steganography

20. Which of the following is the symbol for trademark?
(A) TM, MT and ©                      
(B) TM, MS and ®
(C) TM, SM and ®                    
(D) TM, SM and ©

21. Which of the following is the process of hiding information within other information?
(A) Squatting                          
(B) Steganography    
(C) Name changing                    
(D) Copyright

22. Which of the following is a digital code inserted into a digital image, audio or video file which can identify the file’s copyright information?
(A) Image mark    
(B) Digital mark        
(C) Code mark     
(D) Water mark

23. Who issues the credit card and guarantees the payment to the merchant?
(A) Merchant     
(B) Issuing bank        
(C) Acquiring bank     
(D) Customer

24. Which of the following payment card has a microchip embedded in its surface?
(A) Smart card    
(B) Debit card        
(C) Credit card     
(D) Charge card

STD-12 Computer Textbook Solution CH-04 Introduction to E-Commerce

1. Which of the following is an example for online bookstore?
A. Amazon        
B. IRCTC            
C. Gmail             
D. Yahoo

2. Which of the following is newspaper that exists on the Internet in digital form?
A. I – Newspaper    
B. Internet Newspaper    
C. WWW – Newspaper    
D. E – Newspaper

3. Which of the following is the process of buying and selling products by offering the customers to bid the price?
A. Marketing     
B. Auction            
C. Bookshop         
D. Booking

4. Which of the following is known as the process of conducting the banking transactions over the Internet?
A. Auction        
B. Bidding            
C. Net banking        
D. WWW banking

5. Which of the following is a feature of traditional commerce?
A. Operates within a certain period of time or during business hours.
B. Advertising of the product is done electronically.
C. E-payment systems are used for receiving payment.
D. Customers can browse through products and offers.

6. Which of the following is a feature of E-Commerce?
A. Operates within a certain period of time or during business hours.
B. No sharing of information with competitors.
C. Location renting or purchasing.
D. Advertising of the product is done electronically.

7. Which of the following is not an advantage of E-Commerce?
A. Lower cost                     
B. Conduct business 24 x 7
C. Security                                 
D. No geographical limitations

8. Which of the following is a disadvantage of E-Commerce?
A. Privacy                          
B. Improved customer service
C. Speed                          
D. Conduct business 24 x 7

9. Which of the following E-Commerce business model refers to business and organizations that sell products or services to consumers over the Internet using websites ?
A. Business to Consumer (B2C)             
B. Business to Business (B2B)
C. Consumer to Business (C2B)             
D. Government to Business (G2B)

10. Which of the following E-Commerce business model refers to activities between different business partners?
A. Government to Business (G2B)        
B. Consumer to Business (C2B)
C. Business to Business (B2B)            
D. Business to Consumer (B2C)

11. Which of the following is a good example of C2C model?
A. Auction sites                     
B. E – Newspaper
C. Online purchasing                  
D. Information services

12. Which of the following E-Commerce business model refers to E-Commerce activities involving transactions between and among the consumers?
A. Government to Business (G2B)        
B. Consumer to Consumer (C2C)
C. Business to Business (B2B)                    
D. Business to Consumer (B2C)

13. Which of the following E-Commerce business model involves reverse auctions where the consumers determine the prices of the products or services?
A. Consumer to Business (C2B)             
B. Business to Business (B2B)
C. Consumer to Consumer (C2C)              
D. Government to Business (G2B)

14. Which of the following E-Commerce business model is also a part of E-Governance?
A. Business to Business (B2B)            
B. Consumer to Business (C2B)
C. Consumer to Consumer (C2C)                       
D. Government to Citizen (G2C)

15. Which of the following E-Commerce business model refers to online non-commercial communication between the Government agencies, organizations and departments with other Government agencies, organizations and departments?
A. Business to Business (B2B)            
B. Consumer to Business (C2B)
C. Government to Government (G2G)                   
D. Consumer to Consumer (C2C)

STD-12 Computer Textbook Solution CH-03 Designing Simple Website using KompoZer

Textbook MCQ with Solution CH-03 Designing Simple Website using KompoZer

1. Which of the following helps in promoting the business, selling the products and attracting a large number of customers?
A. Website            
B. Webpage           
C. Form            
D. CSS

2. Which of the following is not an important point to be considered for developing a good website as part of planning process?
A. Purpose            
B. Audience           
C. Content                    
D. Input

3. Which of the following information should a website contain?
A. Complete, Relevant                    
B. Complete, Irrelevant
C. Incomplete, Irrelevant                    
D. Incomplete, Relevant

4. Which of the following content provides an overview of the size, organization, products and services, and other items?
A. Detailed            
B. Long           
C. General                    
D. Short

5. Which of the following is a collection of interlinked web pages?
A. Webpage            
B. Form           
C. KompoZer               
D. Website

6. Which of the following is the first page that opens when the user enters the URL address in the address bar of the browser?
A. Home page        
B. Last page           
C. Web page        
D. First page

7. Which of the following filename is the home page of the website saved as?
A. first.html            
B. index.html       
C. home.html       
D. one.html

8. Which of the following is a variable that is stored on the user’s computer?
A. Integer            
B. HTML           
C. Cookie            
D. Java

9. Which of the following stands for FTP?
A. File Truncate Protocol                    
B. File Transfer Process
C. Fine Tune Protocol                                 
D. File Transfer Protocol


STD-12 Computer Textbook Solution CH-02 Cascading Style Sheets and Java Script

Textbook MCQ with Solution CH-02: Cascading Style Sheets and Java Script

1. Which of the following allows specifying styles for the visual elements of the website?
A. Cascading Style Sheets        
B. Webpage        
C. Form         
D. Animation

2. Which of the following is known as special symbol in the syntax of CSS?
A. Rules                 
B. Selector        
C. Declaration     
D. Input

3. Which of the following are two main parts of CSS rule?
A. Selector, Declaration                     
B. Select, Declaration
C. Selector, Declare                     
D. Selection, Declaration

4. Which of the following is an HTML element on which style can be applied?
A. Declaration            
B. Selector        
C. Select         
D. Declare

5. Which of the following is the syntax of CSS?
A. select {property : value}                
B. selector {value : property}
C. selector {property : value}                 
D. selection {property : value}

6. Which of the following has developed JavaScript?
A. Yahoo                
B. Google        
C. Wikipedia     
D. Netscape

7. Which of the following is a scripting language that allows adding programming to web
pages?

A. Action script             
B. Java Script    
C. HTML         
D. CSS

8. Which of the following is a scripting language that is simple, lightweight programming
language that does not contain advanced programming functionalities?
A. Java Script             
B. HTML        
C. C             
D. Java

9. Which of the following tag is used to insert JavaScript code into an HTML page?
A. <script> ..... <script>                     
B. <script> .... </script>
C. <script> ..... <//script>                     
D. </script> ..... </script>

10. Which of the following symbol signifies the start and end of a JavaScript block?
A. Semicolon                         
B. Square bracket
C. Curtly bracket                                    
D. Round bracket

11. Which of the following is a reusable block of code that performs a particular task?
A. Array                 
B. Code        
C. Program         
D. Function

12. Which of the following statement is used to return a value in a function?
A. Return                 
B. Function        
C. Select         
D. Send

13. Which of the following is generated by the browser due to interaction between the user and the web page?
A. Function                 
B. Response        
C. Event         
D. Value

14. Which of the following is not an event?
A. Abort                 
B. Mouse Over    
C. Set         
D. Load

15. Which of the following is a container for storing data?
A. Variable                 
B. Integer        
C. Event         
D. Event handler

16. Which of the following stands for BOM?.
A. Browser Of Model                     
B. Browser Object Model
C. Browser Object Modeling                 
D. Browser Object Model

17. Which of the following is the top level object in the browser object model?
A. Window             
B. Document        
C. Page             
D. Location

18. Which of the following stands for NaN?
A. Not a Numeric         
B. Not a Number        
C. Not a Noun         
D. Not an Numeric

STD-12 Computer Textbook Solution CH-01: Creating HTML forms using KompoZer

 Textbook Solution for Chapter:1 Creating HTML forms using KompoZer


1. Which of the following is a container used to collect different kinds of inputs from the user?
a. Form        
b. Webpage           
c. Text                
d. Input


2. Which of the following element is used to create an HTML form?
a. Textarea        
b. Form           
c. Select and Option        
d. Input

3. Which of the following is the tag used to implement form element?
a. <form> ..... </form>                 
b. <form> ..... <form>   
c. </form> ..... </form>               
d. <frm> ..... </frm>

4. Which of the following attribute of form is used to specify where to send the form data when the form is submitted?
a. Method         
b. Action             
c. Submit                        
d. Input

5. Which of the following attribute of form specifies the HTTP method to be used when sending the data?
a. Submit          
b. Action             
c. Method                 
d. Input

6. Which of the following values are used by method attribute?
a. GET and POST                     
b. GET and SET
c. GET and PUT                      
d. SET and POST

7. Which of the following method allows only a limited amount of information to be sent at a time?
a. GET        
b. POST             
c. SET       
d. PUT

8. Which of the following method sends the data as a block through the HTTP transaction?
a. GET        
b. SET             
c. PUT                  
d. POST

9. Which of the following attribute of the input element specifies the field that is to be created in the form?
a. Input        
b. Type             
c. Name                  
d. Value

10. Which of the following element allows multi-line text input?
a. Textarea        
b. Input             
c. Select and Option          
d. Form

11. Which of the following element is used in form to create drop-down list or menu?
a. Input        
b. Textarea             
c. Select                 
d. Form

12. Which of the following is a free open source web development IDE?
a. HTML         
b. KompoZer         
c. SciTE                  
d. Base

13. Which of the following stands for “WYSIWYG”?
a. When You See Is When You Get       
b. What You See Is When You Get
c. What You See Is What You Get          
d. When You See Is What You Get