Page 1 :
SRI SAI SCHOOL, Dhaneshwarghat Road; Bhaisasur; Biharsharif (Nalanda), Formative Assessment — II (2021-22), , , , , , , , CLASS — VIII Subject: COMPUTER F.M.: 50 Time : 1 Hr., Select the best alternative out of following, 1) The purpose of markup is to, a) Add hypertext capabilities c) BohA& B, b) Enhance the document d) None of the above, 2) For a particular font its size attribute can be an absolute value ranging form, a) 1-10 c) 1-8, b) 1-9 d) 1-7, 3) The Major components of the Web browser are, A) Menu Bar. C) Location, B) Tool Bar. D) All of the Above., 4) Which one of the following tags is used to insert graphics in the webpage, a) <image> c) <img>, b) <images> d) <graphics>, 5) The following html tag is used to display the content as a moving text, a) <marquee> c) <a href>, b) </img> d) None of the above, 6) html comment should be enclosed between, a) <!-- and -- > ¢) <!--- and -"“", b) <! And !> d) None of the above, 7) tag is used before beginning of the paragraph text, a) <text area> c) <p>, b) <sup> d) <hl>, 8) The element can be used to identify your html file to the outside world, a) Title c) Head, b) Body d) None of the above, 9) Which of the following is true?, , A) BR tag is used to have a blank line, B) In tables, the header cell is centered by default and the data cells are right-aligned, C) The <TR> is used to create a data cell, D) INPUT tag must have at least 4 attributes, , 10) The symbol that identities that IIREF attribute as the name of a NAME anchor, rather than an address or filename is, , A) “&” C)“#, , B) “Ss” D)“!", 11) The purpose of markup is to, , A) Add hypertext capabilities C) Both a) & b), , B) Enhance the document D) None of the above, 12) Which of the following tags do not require a terminator?, , A) <U> C) <B>, , B) <BR> D) None of above
Page 2 :
13) Which one of the following tags is used to insert graphics on the web page?, , A) <IMAGE>, B) <IMAGES>, , C) <IMG>, D) <GRAPHICS>, , 14). If you want to allow playing music on your web page with Internet Explorer; will, not work with people browsing with Netscape., a) <BGSOUND SRC=sounds.wavy loop=infinite>, b) <Bgsound = abe.wav loop =infinite>, , c) <background sound= sound.way loop= infinite >, , d) None of the above, 15) TCP is the acronym for, A) Transmission control protocol, B) Transit control protocol, 16) SMTP stands for, a) Simple mail transfer protocol, b) Single mail transfer protocol, 17) The domain name “gov” stands for, a) US government, b) Any government, 18) Http stands for, a) Hyper text transfer process, b) Hyper text transfer protocol, , C) Transmission calling protocol, D) None of the above, , c) Sequential mail transfer protocol, d) None of the above, , c) Developed nations government, d) None of the above, , c) Higher text transfer process, d) None of the above, , 19) High-level languages like C, FORTRAN are also known as —-., , a. procedural languages, b. Object oriented language, , c. form-based language, d. both a and b, , 20) One of the basic concepts in Object Oriented Programming approach is bundling, both data and functions into one unit known as —-., , a. Simple variable, b. object, , c. bundle, d. both a and b, , 21) Which of the following shows the Operator overloading feature in C++, , a. Polymorphism, b. inheritance, , c. Message passing, d. both a and b, , 22) If there is no value returned by the function, then the function return type should be, , specified as ——, a. void, b. Function name only, , ¢. int, d. float, , 23) Every user-defined function should be declared in the program —., , a. after it is used, b. before it is used, , ¢, at the time of its invocation, d. both a and b, , 24) Classes provide users with a method to create ——data types, , a. character, b. Primitive, , c. integer, d. user-defined, , 25) The data members in a class are usually declared —, , a. Protected, b. public, , 26) Virtual functions are primarily used in ——, , a. inheritance, b. operator overloading, , ¢. private, d. both a and ¢, , ¢, encapsulation, d. data binding
Page 3 :
27) The header file—- is a header file containing the declarations of cin and cout classes, , a. system.h c. iostream.h, b. Stdio.h d. process.h, 28) The class istream is derived from —- which contains all the necessary functions for, handling input, a. Base class c. derived class, b. ios class d. both a and ¢, 29) The class fstream inherited from both iostream and streambase is used for files that, will perform —a. only output c. both input and output, b. only input d. none of them, 30) A class generated from a class template is called —a) Inherited class c) generated class, b) derived class d) base class, , 31) When the compiler generates a class, function or static data members from a, template, it is referred to as —, , a. template instantiation ¢. partial specialization, b. template specialization d. function specialization, 32) Which of these links is used to avoid repetition of scenarios in multiple use cases., a. Include c. Extends, b. Generalization d. None of these, 33) The —— and —- statements which we were using for input from keyboard and, output to display screen C++., a. Cin, cout c. system.out printin, printwriter, b. seanf, printf d. cin, scanf, 34) #include<iostream.h>, #include<iomanip.h>, const int size=10;, void main( ) {, Char str[size]};, Cout<<" enter a string”; Cin>>setw(size)>>, str;, }, For the above program, maximum how many characters can be stored in the array,, a. 11 character c. 9 character, b. 10 character d. 8 character, , 35) Operator overloading provides a flexible way to work with —— and can make —look obvious, , a. object, object c, Classes, program code, , b. simple variables, program code d. classes, assembly code, 36) Which of these file open mode do you use to write into the file., , a. los :cate ¢. ios:sout, , b. ios ::in d. ios s:app, , 37) The current reading position, which is the index of the next byte that will be read, from the file is called., a. get pointer ¢, Curr pointer, b. set pointer d. put pointer
Page 4 :
38) —- is the ability of objects belonging to different types to respond to method calls of, methods of the same name, each one according to appropriate type-specific behavior., , a. Inheritance, b. Virtuality, 39) Computer Network is, , c. Polymorphism, d. None of these., , A. Collection of hardware components and computers, , B. Interconnected by communication channels, C. Sharing of resources and information, D. All of the Above, 40) DNS is the abbreviation of, A. Dynamic Name System, B. Dynamic Network System, , C. Domain Name System, D. Domain Network Service, , 41) What is the meaning of Bandwidth in Network?, A. Transmission capacity of a communication channels, , B. Connected Computers in the Network, C. Class of IP used in Network, D. None of Above, 42) ADSL is the abbreviation of, A. Asymmetric Dual Subscriber Line, B. Asymmetric Digital System Line, 43) Each IP packet must contain, A. Only Source address, B. Only Destination address, 44), A. TCP, B.IP, 45) The last address of IP address represents, A. Unicast address, B. Network address, , , , C. Asymmetric Dual System Line, D. Asymmetric Digital Subscriber Line, , C. Source and Destination address, D. Source or Destination address, , provides a connection-oriented reliable service for sending messages, , Cc. UDP, D. All of the above, , C. Broadcast address, D. None of above, , 46) Which of following provides reliable communication?, , A. TCP, B.IP, 47) The Internet is an example of, A. Cell switched network, B. circuit switched network, 48) What does protocol defines?, A. Protocol defines what data is communicated., B. Protocol defines how data is communicated., , C. Protocol defines when data is communicated., , D. All of above, , 49) . What is the benefit of the Networking?, A. File Sharing, B. Easier access to Resources, , 50) Which of the following can be Software?, A. Routers, B. Firewalls, C. Gateway, , Cc. UDP, D. All of the above, , C. Packet switched network, D. All of above, , C. Easier Backups, D. All of the Above, , D. Modems