Class 11th CS (083) MCQ final

Unit 1: Computer Systems and Organisation

Q1. A computer system consists of:
A. Hardware only
B. Software only
C. Hardware and software
D. Internet and user
Q2. Which of the following is a hardware component?
A. Operating System
B. Compiler
C. Keyboard
D. Spreadsheet
Q3. Which device is used to enter data into a computer?
A. Monitor
B. Printer
C. Keyboard
D. Speaker
Q4. Which of the following is an output device?
A. Mouse
B. Scanner
C. Monitor
D. Keyboard
Q5. CPU consists of:
A. RAM and ROM
B. ALU and Control Unit
C. Input and output units
D. Cache and registers
Q6. Which memory is the fastest?
A. Secondary memory
B. Primary memory
C. Cache memory
D. Hard disk
Q7. Which memory is volatile in nature?
A. ROM
B. Hard disk
C. RAM
D. DVD
Q8. Which unit of memory is the largest?
A. GB
B. TB
C. MB
D. PB
Q9. Software required to run computer hardware is called:
A. Application software
B. System software
C. Utility software
D. Programming software
Q10. Which of the following is system software?
A. MS Word
B. Web browser
C. Operating System
D. Spreadsheet
Q11. Device drivers are used to:
A. Write programs
B. Control hardware devices
C. Edit documents
D. Browse internet
Q12. Which software translates high-level language into machine code?
A. Assembler
B. Compiler
C. Interpreter
D. Loader
Q13. An interpreter:
A. Translates entire program at once
B. Executes program line by line
C. Produces object code
D. Works only with assembly language
Q14. Which of the following is application software?
A. Linux
B. Printer driver
C. MS Excel
D. Compiler
Q15. The primary function of an operating system is to:
A. Write programs
B. Manage computer resources
C. Edit files
D. Design hardware
Q16. Which of the following is NOT a function of OS?
A. Memory management
B. Process management
C. Virus detection
D. File management
Q17. GUI stands for:
A. General User Interface
B. Graphical User Interface
C. Global User Interface
D. Graphic Utility Interface
Q18. Command Line Interface (CLI) uses:
A. Icons and menus
B. Touch gestures
C. Text-based commands
D. Voice commands
Q19. The output of NOT gate is opposite of the input. This statement is:
A. False
B. True
C. Undefined
D. Conditional
Q20. AND gate produces output 1 when:
A. Any input is 1
B. All inputs are 1
C. All inputs are 0
D. Inputs are different
Q21. OR gate produces output 0 when:
A. Any input is 1
B. All inputs are 1
C. All inputs are 0
D. Inputs are same
Q22. Which gate is called universal gate?
A. AND
B. OR
C. NAND
D. XOR
Q23. De Morgan’s laws are used to:
A. Simplify logic expressions
B. Convert numbers
C. Design memory
D. Control CPU
Q24. Binary number system is based on:
A. Base 2
B. Base 8
C. Base 10
D. Base 16
Q25. Decimal number system uses digits from:
A. 0–7
B. 0–9
C. 0–15
D. 1–10
Q26. Which number system uses digits 0–9 and A–F?
A. Binary
B. Octal
C. Decimal
D. Hexadecimal
Q27. Octal number system has base:
A. 2
B. 8
C. 10
D. 16
Q28. ASCII uses how many bits to represent a character?
A. 4 bits
B. 7 bits
C. 8 bits
D. 16 bits
Q29. Unicode is mainly used to:
A. Reduce file size
B. Support multiple languages
C. Encrypt data
D. Compress files
Q30. Which encoding scheme supports Indian languages?
A. ASCII
B. Unicode
C. ISCII
D. UTF-8 only

END………….

 

Unit 2: Computational Thinking and Programming - I

Q1. The first step in problem solving is:
A. Coding
B. Testing
C. Analyzing the problem
D. Debugging
Q2. An algorithm is:
A. A programming language
B. A step-by-step solution to a problem
C. A flowchart
D. A compiler
Q3. Which representation uses symbols and arrows?
A. Algorithm
B. Pseudocode
C. Flowchart
D. Source code
Q4. Pseudocode is:
A. Written in Python syntax
B. Written in natural language-like statements
C. Executable code
D. Machine language
Q5. Breaking a problem into smaller parts is called:
A. Compilation
B. Decomposition
C. Debugging
D. Execution
Q6. Testing helps to:
A. Write code
B. Find logical errors
C. Convert data
D. Design flowchart
Q7. Python is a:
A. Low-level language
B. Assembly language
C. High-level interpreted language
D. Machine language
Q8. Which mode executes Python code line by line?
A. Script mode
B. Batch mode
C. Interactive mode
D. Debug mode
Q9. Which of the following is a Python keyword?
A. sum
B. input
C. for
D. print
Q10. Which of the following is a valid identifier?
A. 2value
B. total_marks
C. for
D. total-marks
Q11. Literals represent:
A. Variables
B. Fixed values
C. Operators
D. Keywords
Q12. Which symbol is used for comments in Python?
A. //
B. /* */
C. #
D. <!– –>
Q13. An l-value refers to:
A. Constant value
B. Expression result
C. Variable on left side of assignment
D. Right side operand
Q14. r-value refers to:
A. Variable name
B. Memory location
C. Value assigned to a variable
D. Identifier
Q15. Which of the following is an immutable data type?
A. List
B. Dictionary
C. Tuple
D. Set
Q16. Which data type stores key–value pairs?
A. List
B. Tuple
C. Dictionary
D. String
Q17. Which data type can store True or False?
A. int
B. float
C. bool
D. complex
Q18. Which of the following is mutable?
A. String
B. Tuple
C. Integer
D. List
Q19. None represents:
A. Zero
B. Empty string
C. Absence of value
D. False
Q20. Complex numbers are written as:
A. a + b
B. a + bi
C. a + bj
D. a + b*i
Q21. Which operator checks object identity?
A. ==
B. !=
C. is
D. in
Q22. Which operator checks membership?
A. is
B. ==
C. in
D. :=
Q23. Which operator has highest precedence?
A. +
B. *
C. **
D. //
Q24. Type conversion done automatically is called:
A. Explicit conversion
B. Manual conversion
C. Implicit conversion
D. Forced conversion
Answer: C
Q25. Which function accepts input from user?
A. scan()
B. read()
C. input()
D. get()
Q26. Which function displays output?
A. show()
B. output()
C. print()
D. display()
Q27. Missing colon (:) causes:
A. Logical error
B. Runtime error
C. Syntax error
D. Semantic error
Q28. Error occurring during execution is:
A. Syntax error
B. Logical error
C. Runtime error
D. Typographical error
Q29. Indentation in Python is used to:
A. Improve speed
B. Improve memory
C. Define blocks of code
D. Add comments
Q30. Sequential flow means:
A. Jumping statements
B. Loop execution
C. Line-by-line execution
D. Conditional execution
Q31. Which statement is used for decision making?
A. for
B. while
C. if
D. break
Q32. if-elif-else is used when:
A. Only one condition
B. Multiple conditions
C. Loop is needed
D. Error handling
Q33. range(1,5) generates values:
A. 1 to 5
B. 1 to 4
C. 0 to 5
D. 0 to 4
Q34. Which loop is best when number of iterations is known?
A. while
B. for
C. infinite
D. nested
Q35. break statement:
A. Skips iteration
B. Stops loop execution
C. Restarts loop
D. Skips condition
Q36. continue statement:
A. Terminates loop
B. Exits program
C. Skips current iteration
D. Ends condition
Q37. Strings in Python are:
A. Mutable
B. Immutable
C. Dynamic
D. Numeric
Q38. Which function returns length of string/list?
A. count()
B. size()
C. len()
D. length()
Q39. Which method converts string to uppercase?
A. upper()
B. capitalize()
C. title()
D. swap()
Q40. Which list method adds element at end?
A. add()
B. append()
C. insert()
D. extend()
Q41. Which method removes element using index?
A. remove()
B. pop()
C. delete()
D. discard()
Q42. Tuples are enclosed in:
A. []
B. {}
C. ()
D. <>
Q43. Which function sorts tuple elements?
A. sort()
B. sorted()
C. arrange()
D. order()
Q44. Nested list means:
A. List inside tuple
B. Tuple inside list
C. List inside another list
D. Dictionary inside list
Q45. Dictionary elements are accessed using:
A. Index
B. Position
C. Keys
D. Values
Q46. Which method removes all dictionary items?
A. del()
B. clear()
C. pop()
D. popitem()
Q47. Which module provides mathematical functions?
A. random
B. statistics
C. math
D. sys
Q48. Which function returns square root?
A. pow()
B. sqrt()
C. fabs()
D. ceil()
Q49. randint(1,10) returns:
A. Only 1
B. Only 10
C. Random integer between 1 and 10
D. Float value
Q50. mean() function belongs to which module?
A. math
B. random
C. statistics
D. sys

Unit 3: Society, Law and Ethics

Q1. A digital footprint refers to:
A. Footprints on electronic devices
B. Physical movement on internet
C. Online trace of a user’s activities
D. Computer hardware tracking
Q2. A responsible internet user is called a:
A. Programmer
B. Netizen
C. Hacker
D. Webmaster
Q3. Net etiquettes are:
A. Programming rules
B. Rules for safe browsing
C. Guidelines for polite online behavior
D. Security protocols
Q4. Which is an example of social media etiquette?
A. Sharing passwords publicly
B. Posting offensive comments
C. Respecting others’ opinions
D. Spreading fake news
Q5. Intellectual Property Rights (IPR) protect:
A. Hardware devices
B. Software viruses
C. Creations of the mind
D. Internet connections
Q6. Plagiarism means:
A. Buying software
B. Copying someone’s work without credit
C. Installing antivirus
D. Encrypting data
Q7. Which IPR protects brand names and logos?
A. Copyright
B. Patent
C. Trademark
D. License
Q8. Creative Commons licenses are used for:
A. Paid proprietary software
B. Hardware manufacturing
C. Sharing creative work legally
D. Virus protection
Q9. Cyber crime refers to:
A. Crimes committed physically
B. Crimes involving computers and networks
C. Software installation
D. Online shopping
Q10. Phishing attacks are mainly used to:
A. Improve security
B. Steal personal information
C. Repair computers
D. Encrypt data
Q11. Fraud emails generally:
A. Come from known sources
B. Ask for confidential information
C. Improve user awareness
D. Are system-generated
Q12. Ransomware is a type of malware that:
A. Deletes files permanently
B. Displays advertisements
C. Locks data and demands money
D. Steals hardware
Q13. Cyber bullying involves:
A. Physical harassment
B. Online harassment or threatening behavior
C. Software piracy
D. Network monitoring
Q14. Safe browsing includes:
A. Clicking unknown links
B. Sharing OTPs
C. Using secure websites (https)
D. Ignoring antivirus
Q15. Identity protection means:
A. Sharing passwords
B. Protecting personal information online
C. Using public Wi-Fi always
D. Downloading pirated software
Q16. A computer virus is a program that:
A. Improves system speed
B. Replicates and damages data
C. Protects files
D. Updates software
Q17. Trojan horse malware:
A. Is a useful software
B. Self-replicates
C. Appears harmless but is malicious
D. Only shows advertisements
Q18. E-waste refers to:
A. Environmental waste
B. Electronic waste
C. Energy waste
D. Encrypted data
Q19. Proper disposal of e-waste is important to:
A. Increase pollution
B. Save money
C. Protect environment and health
D. Improve internet speed
Q20. Technology should be used in society to:
A. Create inequality
B. Ignore disabled users
C. Promote inclusiveness and accessibility
D. Replace human interaction

Leave a Reply

Your email address will not be published. Required fields are marked *

sign up!

We’ll send you the hottest deals straight to your inbox so you’re always in on the best-kept software secrets.