FYBSC IT - SEM II - MCQ

 

MCQ – Multiple Choice Questions

 

SAMPLE MCQ

 

AS PER 

UNIVERSITY OF MUMBAI 

SYLLABUS

 

 

Will be helpful to regular students of Mumbai university colleges who are going to give the online examinations of SEM II, SEM  IV and SEM V class of students.

If it is helpful to you so also share it among your friends so that they will be also benefited from it.

 

ANSWERS ARE HIGHLIGHTED IN BOLD



CLASS: F.Y.B.SCIT-II SEM REGULAR

 

SUB :OBJECT ORIENTED PROGRAMMING LANGAUGE

 

MCQ (50 QUESTIONS)

 

1. ) Which of the following language was developed as the first purely object programming language?

 a. Smalltalk   b. C++   c. Kotlin  d. Java

2) Who developed object-oriented programming?

a.    Adele Goldberg  b. Dennis Ritchie  c.  Alan Kay d. Andrea Ferro

3) Which of the following is not an OOPS concept?

a. Encapsulation  b. Polymorphism  c.  Exception  d. Abstraction

4) Which feature of OOPS described the reusability of code?

a.  Abstraction  b. Encapsulation  c. Polymorphism  d. Inheritance

5) Which of the following language supports polymorphism but not the classes?

   a. C++ programming language     b.  Java programming language

   c.Ada programming language   d. C# programming language

6) Which among the following feature is not in the general definition of OOPS?

a.    Modularity                             b.  Efficient Code  

c. Code reusability                     d. Duplicate or Redundant Data

 

7) Which feature of OOPS derives the class from another class?

a.    Inheritance  b. Data hiding  c. Encapsulation  d. Polymorphism

8)A single program of OOPS contains _______ classes?

 a. Only 1   b.Only 999   c. Only 100  d. Any number

9) Which operator from the following can be used to illustrate the feature of polymorphism?

a. Overloading <<  b. Overloading &&  c. Overloading | |  d. Overloading +=

10) Which two features of object-oriented programming are the same?

     a. Abstraction and Polymorphism features are the same

     b.Inheritance and Encapsulation features are the same

    c.Encapsulation and Polymorphism features are the same

d.    Encapsulation and Abstraction

11)  Which header file is required by the C++ programming language to use the   

         OOPS concept?

     a. stdio.h      

     b. iostream.h

     c. stdlib.h

      d.We can easily use the OOPS concepts in c++ programs without using    

       any header file.

 

 

12) Which of the following definition is incorrect for polymorphism?

    a. Polymorphism helps in redefining the same functionality

    b. Polymorphism concept is the feature of object-oriented programming

        (OOP)

c.    It always increases the overhead of function definition

d.    Ease in the readability of the program

13)  Which among the following cannot be used for the concept of polymorphism?

    a. Static member function             b. Constructor Overloading

    c. Member function overloading   d.Global member function

14)Which function best describe the concept of polymorphism in programming languages?

a.  Class member function   b. Virtual function

 c. Inline function               d. Undefined function

15)  Which member function is assumed to call first when there is a case of using function overloading or abstract class?

 a.  Global function               b. Local function

c. Function with lowest priority  d. Function with the highest priority

16) Which of the following OOP concept is not true for the C++ programming language?

     a.A class must have member functions

     b.C++ Program can be easily written without the use of classes

    c. At least one instance should be declared within the C++ program

    d.C++ Program must contain at least one class

17)  What is the extra feature in classes which was not in the structures?

     a. Member functions                    b. Data members

     c. Public access specifier            d. Static Data allowed

18) How many types of polymorphism in the C++ programming language?

     a. Three types of polymorphism  b. Two types of polymorphism

      c. Five types of polymorphism    d. Four types of polymorphism

19)  Which of the following feature is also known as run-time binding or late binding?

  a. Dynamic typing  b. Dynamic loading  c. Dynamic binding  d.Data hiding

20)  Which of the following OOP concept binds the code and data together and keeps them secure from the outside world?

 a.Polymorphism    b. Inheritance  c.  Abstraction  d. Encapsulation

21)  Which member of the superclass is never accessible to the subclass?

    a. Public member                b. Protected member 

    c.  Private member         d) Processed member

22)  What is the size of a class?

 a. Sum of the size of all inherited variables along with the variables of the same class

b. The size of the class is the largest size of the variable of the same class

c. Classes in the programming languages do not have any size

d. Sum of the size of all the variables within a class

23)  The object cannot be________?

 a.passed by copy                                        b.passed as function                               

 c. passed by value                                       d. passed by reference

24)  Which among the following feature does not come under the concept of  

        OOPS?

  a. Data binding   b.  Data hiding  c. Platform independent  d.Message passing

25)  The combination of abstraction of the data and code is viewed in________.

   a. Inheritance  b. Object  c. Class  d. Interfaces

26)  The principle of abstraction___________

   a. is used to achieve OOPS           b. is used to avoid duplication

   c. Use abstraction at its minimum   d. is used to remove longer codes

27) following which is not keyword used in C++

a.asm       b. private        c. struct         d. which

28) ___________ a user defined data type in C++

   a. enum                 b. for               c. while                     d.asm

29)  ::  is _____ operator 

a) size of operator                b) address of operator

c) logical not operator                     d)scope resolution

30) following which is  binary operator

a) size of operator                b) address of operator

c) logical not operator         d) arithmetic operator

31) _____ functions are  used to display a character on the monitor

a) putch                    b) puts                        c) gets                       d) getch

 

 

32)break, continue, goto are _____

a) control statement                         b) branching statement

c)  manipulator statement   d) parameterised statement

33) strut structname_name

{

Datatype variable name_ 1

Datatype variable name_ 2

};    Is syntax of

a.for                b.structure c.pointer         d. for loop

34) following which  methods not used  for defining classes in C++

a) Internally defined functions                   b) Externally defined functions

c)Inline functions                                          d) External functions 

35)  if a function is to be defined outside the  class, but still be treated as a internally defined function then such function has to be made_________

a) Internally defined functions                   b) Externally defined functions

c)Inline functions                                       d) External functions

36 ) Constructor has to be defined only in the ______ visibility of a class

 a.Public member b. Protected member c Private member d. Processed member

37) _______ refers to creating  multiple functions with same name but different parameter

a) function overriding                                  b) function overloading

 c) function passing                         d) Inheritance

38) ______ is type of dynamic binding

a) Virtual function                         b) constructor overloading

c) function overloading                               d) operator overloading

39) if a base class function and derived class function have same name and same parameter then it is said to be _______

a) function overriding                               b) function overloading

c) function passing                          d) Inheritance

40) virtual return_type function_name()= 0 is syntax of ___

a) Virtual function                                        b) pure virtual function

c) virtual base class                                     d) pointer to object

41) ____ is address of opearator

a) *                              b) {                   c) #                d) &

42)  if x= 3

then

y= ~x

will result in y having  value of ____

a)3                  b) -3                            c) 4                             d) -4

43) IDE stands for________

a) Independent Development Environment

b) Integrated Development Environment

c) Independent Deployment  Environment

d) Integrated Deployment Environment

44) ______ operator returns the value of the variable added with one and stores the result in the variable itself

a) increment(++)    b)decrement(--)    c) bitwise(-)    d) unary minus(-)

45) ________ statements transfer the control to different places in the program

    a) Control statement                               b) Branching statement

    c) nested statement                                d)looping statement

46) When the member functions of a class are defined inside the class itself they are called as ___________

a) Internally defined functions               b) Externally defined functions

c)Inline functions                                                  d) External functions

47) To create many object of a class we can use the _____

a) string                      b) pointer                   c) pointer to object            d) structure

48) a ____ is used to destroy the memory allocated by the constructor

a) Parameterized Constructor                     b) Destructor                                            

 c) Default constructor                                   d) Constructor

49) Method overloading is type of ___

  a) Static binding b) dynamic binding  c)Class binding d) Object binding

50) Private, Public, Protected are _____

a) Function b) Operator c) Access specifier d) Objects



CLASS: F.Y.B.SCIT-II SEM REGULAR

 

SUB : GREEN COMPUTING

 

 

MCQ (50 QUESTIONS)

 

1)    The process in which  metals and plastics must be separated, and then the circuit boards are shredded to separate the aluminium, iron, and copper from the valuable precious metals, such as silver.

a)    Refurbishing

b)   Recycling

c)    Emart

d)    RoHS

2)    Full form of  StEP

a)    Super Electronic Program

b)   Solving the E-waste Problem

c)    Solving Electronic Program

d)    Step toward Ewaste Program

3)    StEP is based on ____ principles.

a)    ONE

b)    TWO

c)    FOUR

d)   FIVE

4)     BAN stands for

a)    Basel Action Network

b)    Ban All Network

c)    Basel Act Network

d)    Baseline all Network

5)    BAN is active on a number of campaigns, including the following:

a)    Refurbishing

b)    Recycling

c)    blade servers

d)   E-Waste Stewardship Project

6)    Green computing is related to

a)    keeping green environment by not using electricity

b)    growing  trees

c)    not cutting the trees

d)   making your computer toxic free

7 EPEAT stands for

a)    Electronic Product Environmental Assessment Tool

b)   Exact  Product Environmental Assessment Tool

c)    Electronic Process Environmental Assessment Tool

d)   Electronic Product Electrical Assessment Tool

8     With the ________program, consumers can bring up to 10 computers to be recycled at no charge to them.

a)    economisers

b)    pay back

c)    byteback

d)    refurbhish

 

9     The European Union leads the world with its e-waste management __directives.

a)    Byteback

b)   WEEE and its RoHs

c)    EPAT

d)    EEE

 

10  WEEE Directive Stands for

a)    The Waste Electrical and Electronic Equipment Directive

b)   The Water Electrical and Electronic Equipment Directive

c)    The Waste Electronic Equipment Directive

d)   The Waste Electrical and Electronic Environment Directive

11  RoHS stands for

a)    Right of Hazardous Substances

b)   Restriction of Hazardous Substances Directive

c)    Recycle of hazardous substances

d)    Rate of high solid

12  A typical computer monitor may contain more than ___lead by weight, much of which is in the lead glass of the cathode ray tube (CRT)

a)    6 percent

b)    60 percent

c)    61 percent

d)    66 percent


 

13  Gartner estimates that PCs ____are discarded by U.S. homes and businesses each day.

a)    33,000

b)    233,000

c)    133,000

d)    3,000

 

14  On average, a thin client uses ___ watts of energy instead of the ___ watts that workstations use

a)    15 , 150

b)    150 ,15

c)    15,15

d)    150,150

15  An average desktop PC requires ___ watts just to idle, even with the monitor off.

a)    185

b)    285

c)    825

d)   85

16  _____ works to ban waste trade and promote green, toxin-free design of consumer products.

a)    ROHS

b)   BAN

c)    EPEAT

d)    WEEE

 

17  In December 2007,the U.S. Department of Defense, NASA, and the General Services Administration outlined a rule that requires purchases to be compliant with ___

 

a)    ROHS

b)    BAN

c)    EPEAT

d)    WEEE

 

 

18  PBBs stands for  ____

a)    Polybrominated ban

b)    Poly bran biphenyls

c)    Polybrominated boral

d)   Polybrominated biphenyls

 

 

 

19 ____ is a program that is open to companies, governmental organizations, academic institutions, nongovernmental organizations (NGOs), and nonprofit organizations around the world

a)    Byteback

b)   StEP

c)    WEEE

d)    ROHS

 

20 Conducts field research and investigations in developing countries. It also provides photographic and video documentation of e-waste trade

a)    ROHS

b)   BAN

c)    EPEAT

d)    WEEE

 

21 ____ was developed by the Green Electronics Council in Portland, to help institutional purchasers evaluate, compare, and select desktop computers, notebook computers, and monitors based on their environmental attributes.

a)     ROHS

b)    BAN

c)    EPEAT

d)    WEEE

 

22 ____condemns all illegal activities related to e-waste, including illegal shipments and reuse and recycling practices that are harmful to the environment and human health

a)    Byteback

b)   StEP

c)    WEEE

d)    ROHS

 

23 A program working toward an internationally binding treaty on mercury pollution to eliminate its extraction, use, trade, and recycling. To eliminate surplus mercury trade to developing countries.

a)    E-Waste Stewardship Project

b)    Green Shipbreaking

c)    Zero Mercury Campaign

d)    Basel Ban Ratifications

24  BAN promotes the ____ globally and works to prevent the weakening of this amendment

a)    E-Waste Stewardship Project

b)    Green Shipbreaking

c)    Zero Mercury Campaign

d)   Basel Ban Ratifications

25 A program that ensures hazardous materials have been removed from U.S. government ships prior to export

a)    E-Waste Stewardship Project

b)   Green Shipbreaking

c)    Zero Mercury Campaign

d)    Basel Ban Ratifications

 

26Sellback is done for

a)    Cooling effect

b)   Power saving

c)    polling

d)    Hard disk cleaning

 

27  Economizers can be

a)    Air based

b)    Sewage based

c)    light based

d)    fluid based

28 Total  Cooling Needs of  company do not depend on

a)    Room Area BTU  ,Windows BTU  ,Total Occupant BTU

b)    Economiser used

c)    hard drive used

d)    database and Datawarehouse

 

29 Power usage can be checked by

a)    IBM Power executive

b)    servers

c)    Maid

d)    thin client

 

30 Economisers can be optimised by

a)    Floor mounted

b)    same hot and cold aisle

c)    blade servers

d)    Green drives

 

31 Disk drives considering Green Computing

a)    RAID

b)    SERVERS

c)    RECYCLING

d)    POLLING

 

32  _______ device is a US$25 product that you plug into the wall and then plug your computer or monitor into the device. The result is that it will show you how much power your device is using.

a)    The Kill A Watt device

b)    Polling

c)    wifi

d)    blade server

 

 

33  You can reduce ______your servers use by deploying blade servers and by virtualizing your servers.

a)    the amount of energy

b)    the amount of money

c)    the amount of polling

d)    the amount of raid

 

34  The computer automatically checking to see if a given action has been taken—draws power from idling computers, because it automatically wakes the computer up to check for a given event is known as

a)    RAID

b)   POLLING

c)    VIRTUALISATION

d)    BACON PACKET

35  ____are drives that reduce the amount of power they use through a variety of mechanisms, including unloading the heads during idle time to reduce aerodynamic drag.

a)    Green environment .

b)    Green power

c)    Green hard drives

d)    Yellow hard drives

36  According to a study by Gartner, ____of datacenters said they will have insufficient power and cooling capacity by 2008—Gartner, November 2006.

a)    500 percent

b)    150 percent

c)    5 percent

d)   50 percent

37  Blade servers consume about ___less power than equivalent rack mount servers because multiple servers share common power supplies, cooling fans, and other components

a)    10 percent

b)    100 percent

c)    1 percent

d)    110 percent

38  In sleep mode, monitor  typically use ___or less power

a)    500 W

b)    50 W

c)    150 W

d)   5 W

 

39  APs announce their presence at regular intervals by sending a ____.

a)    beacon packet

b)    back packet.

c)    bee packet.

d)    bea packet.

 

 

40   Estimates state that cooling can account for upward of ___of your IT department’s power usage

a)    163 percent

b)   63 percent

c)    263 percent

d)    6 percent

41  BTU stands for

a)    British Thermal Units

b)    BCC Thermal Units

c)    British Threat Units

d)    British Treaty Units

42   One kilowatt is the same as ____ BTUs.

a)    12

b)    34

c)    3412

d)    32

43  EPA Stands for

a)    Environmental Protection Agency

b)    Electrical  Protection Agency

c)    Environmental Partition Agency

d)    Environmental Protection Agreement

44   The goal of the ___task force is to enhance global recycling infrastructures, systems, and technologies while realizing sustainable e-waste-recycling systems.

a)     ReCycle

b)     WEEE

c)     ROHS

d)    REFURBISH

 

45  One way you can cut your electrical bill and make a move toward carbon neutrality is to _____

a)    generate your own server

b)   generate your own power

c)    generate your own system

d)    generate your own economiser


46  ___is a big problem. It represents 2 percent of American landfills, but it accounts for 70 percent of overall toxic waste.

a)    Electronic waste

b)    Sewage waste

c)    Water waste

d)    Hard drive waste

 

 

47  ____, an industry trade group (www.iaer.org), reports that more than 500 U.S. companies recycle 1.4 million tons of electronics annually

a)    The International Association Servers

b)    The  Electronics Recyclers

c)    The International Association of Electronics Recyclers

d)    The Indian Association of Electronics Recyclers

48  The ____limits the amount of human contact with hazardous materials during processing.

a)    manual process

b)   automation process

c)    chaos process

d)    ai

 

49  The first stage of measuring carbon footprints is

a)    Define what is included in your carbon footprint.

b)    Set your baseline.

c)    Track, calculate, and analyze your footprint.

d)    Report your results to stakeholders.

 

50  The last stage of measuring carbon footprints is

a)    Define what is included in your carbon footprint.

b)    Set your baseline.

c)    Track, calculate, and analyze your footprint.

d)   Report your results to stakeholders.

 

 

 

CLASS : F.Y.Bsc IT -II SEM

 

SUB: Microprocessor Architecture

 

CLASS TEST : 50 QUESTIONS

 

 

1. This unit is used to perform arithmetic operations (+, -, *, / etc) .

a. MPU      b. CPU    c. ALU    d. Memory

2. A binary code, that indicates the operation to be performed is called _______

a. code   b. memory code    c.byte code       d. opcode

3. It is mechanism by which an I/O device or instruction  can suspend the normal execution of the processor.

a. Program      b. Instruction   c. Procedure    d. Interrupt

4. This unit is a control section of microprocessor made up of synchronous sequential logic circuit.

a. Interrupt unit  b. Time and Control unit  c. ALU   d. Memory Unit

5. The bus over which the CPU sends out the address of the memory location is called _____

a. data bus   b. Control bus   c. Address bus  d. I/O bus

6. This bus consists of 8, 16 or 32 parallel lines.

a. data bus   b. Control bus   c. Address bus  d. I/O bus

7. This bus is used for sending control signals to memory and I/O devices.

a. data bus   b. Control bus   c. Address bus  d. I/O bus

8. __________ bus is unidirectional bus.

a. data bus   b. Control bus   c. Address bus  d. I/O bus

9.  _______ bus is bidirectional bus.

a. data bus   b. Control bus   c. Address bus  d. I/O bus

10. 8085 microprocessor is ________ bit processor.

a. 4 bit  b. 8 bit c. 16 bit   d. 32 bit

11. ______________instruction is  non-maskable interrupts in 8085 microprocessor.

a. RST5.5   b.RST 6.5    c. RST 7.5    d. Trap

12. _______ instruction is non-vectored interrupts.

a. a. RST5.5   b.RST 6.5    c. RST 7.5    d. INTR

13. ________ is I/O control instruction in 8085.

a. SID   b. INTR   c. INTA   d. TRAP

14.  _______ are Temporary register in 8085.

a.  WZ   b. BC   c. DE   d. A

15. The Valid general purpose register in 8085.

a. WZ   b. BC  c. A     d. ALU

16. The ________ register is used to store the result in 8085.

a. Accumulator    b. I/O control   c. General purpose   d. Interrupt

17.  There are _________ flag register in 8085.

a.  4    b. 1   c. 5    d. 8

18.  This flag is set whenever there has been carry out of, or a borrow into higher order bit of the result.

a. Z    b. S    c. CY    d. P

19. MSB stands for _____________

a. More single bit        b. Most Significant bit        c. More Significant bit     d. Much Significant bit

20. This flag is set when the result has even parity or odd parity.

a. Z     b. S   c. CY   d. P

21. This flag is set when the result of operation is zero else it is reset.

a. Z     b. S   c. CY   d. P

22. This flag is set when MSB of the result is 1.

a. Z     b. S   c. CY   d. P

23. This register is not accessible to the user.

a. Instruction    b. Program counter    c. Stack Pointer   d. Accumulator

24. This resister is used to hold the address of program memory.

a. Instruction    b. Program counter    c. Stack Pointer   d. Accumulator

25. This is reserved portion of memory where information can be stored or taken back under software control. This memory area is referred to as ______

a. Instruction    b. Program counter    c. Stack Pointer   d. Accumulator

26. ________ refers to the accumulator and flag register when accumulator is the high order register and flag register is the low order register

a. Instruction    b. Program Status Word    c. Stack Pointer   d. Accumulator

27. MOV B,C is ______ byte instruction.

a. 1         b.   2        c. 3          d. 4

28.  MVI B,57H  is ________ byte instruction.

a. 1      b.   2        c. 3          d. 4

29. STA 5600H is ______ byte instruction.

a. 1      b.   2        c. 3          d. 4

30. The ___________is a pictorial representation of various actions and computations that are taken to perform any task in 8085 programing.

a. Graph    b.  Chart   c. FlowChart    d. diagram

31.  ______ symbol is Star and Stop unit in Flowchart.

a. Circle   b. Rectangle  d. Oval  d. Diamond

32. This cycle consists of a fetch cycle and an execution cycle.

a. Interrupt      b. Instruction    c. Time control    d. machine

33. The time required by the microprocessor to complete the operation of accessing memory or I/O device is called as _______

a. Interrupt cycle     b. Instruction cycle   c. Time control    d. machine cycle

34. MOV D,B is _________ addressing mode instruction.

a. Register   b. Direct   c. Indirect   d. Implied

35. LDA C200H  is _________ addressing mode instruction.

 a. Register   b. Direct   c. Indirect   d. Implied

36. LDAX B is _________ addressing mode instruction.

a. Register   b. Direct   c. Indirect   d. Implied

37. CMC is _________ addressing mode instruction.

a. Register   b. Direct   c. Indirect   d. Implied

38. MOV B,C  is ________ type of Instruction set.

a. Data Transfer   b. Arithmetic   c. Logical   d. Branching

39. ADD M is ________ type of Instruction set.

a. Data Transfer   b. Arithmetic   c. Logical   d. Branching

40. ________ instruction uses the auxiliary carry flag.

a. DAA     b. ADD R   c.  MOV r1,r2          d. LDA C200H


 

41. This instruction increments the contents of specified register by 1.

a. INTR    b. INR  R     c. DCR R   d. INX R

 42. This instruction increment the contents of specified register pair HL.

a. INTR    b. INR  R     c. DCR R   d. INX R

43. ANA M  is ________ type of Instruction set.

a. Data Transfer   b. Arithmetic   c. Logical   d. Branching

44. This instruction will logically OR the contents of accumulator with the contents of memory location and the is stored in the accumulator.

a. ORA R   b. ORA M  c. ORI data   d. ANI data

45. This instruction complements the carry flag.

a. CMC   b. CMA  c. STC    d. STA

46. This instruction subtracts the 8-bit data given in the instruction from the contents of the accumulator and sets the condition flags as a result subtraction.

a. CMP R    b. CMP M  c. CPI data   d. CMA

47. HLT instruction meaning _______

a. start MPU   b. stop MPU   c. process MPU   d. Hold  MPU

48. This instruction will rotate the contents of the accumulator left by 1 bit position along with carry.

a. Rotate Accumulator left though carry   b. Rotate Accumulator right though carry 

c. Rotate Accumulator left   d. Rotate Accumulator right

49. _______ instruction rotates the contents of the accumulator to the right by one position.

a. RAR     b. RAL   c. RLC   d. RRC

50.   __________ value is 1’s complement of 1001 1100

a. 0110 0011    b. 1100 0011   c. 1010 1010   d.  0011 1100



CLASS : F.Y.Bsc IT -II SEM

 

SUB: Web Programing

 

50 QUESTIONS

 

 

1. It is a System of interlinked hypertext documents access via the Internet.

a. HTML   b. C++   c. WWW  d. Java

2. URL stands for __________

a. Uniform Record Location   b. Uniform Resource Locator  c. Universal Record Location d. Universal Read Line

3. ________ is designed to search for information on the world wide web and FTP servers.

a. WWW       b. Search engine         c. Web page      d. http

4. _________ is a standard network protocol used to transfer files from one host to another host.

a. FTP   b. HTTP  c. Telnet  d. WWW 

5. ________ is a company that provides access to the internet.

a. WWW   b. ISP  c. FTP    d. HTTP

6. ________ is a hierarchical distributed naming system for computers, services or any resource connected to the internet.

a. DNS   b. ISP   c. WWW   d. FTP

7. The following is non-geographical domain name.

a. .in     b.  .gov   c. .au   d. .uk

8. In computer network, a ______is a server that acts as an intermediary for requests from clients seeking resources from other server.

a. DNS    b. Web  server c. Proxy  server d. Client Server

9. ________is a software application for retrieving, presenting and traversing information resources on the World Wide Web.

a. Application software  b. Web browser   c. System  Software     d. Custom-built software

10. The following is the Web Browser

a. Mozilla Firefox    b. Notepad   c. Windows     d. Editor

11. ________ is a language for designing web pages.

a. C++   b. HTML  c. Window    d. Java

12. ________ tag defines font, color and size.

a. <B>    b. <font>  c. <color>   d. <size>

13. _________ tag defines an HTML form for user input.

a. <form>   b. <I>  c. <html>   d.  <body>

14. __________ tag is largest heading in HTML.

a. <h2>   b. <h1>   c. <h6>   d. <h5>

15. _________ tag defines to insert an image in HTML.

a. <image>   b. <img>  c. <imagesrc>      d. <src>

16. ______ tag defines       the relationship between a document and an external resource.

a. <rel>   b. <link>    c. <a>    d. <body>

17. ________ tag defines a multi-line text input control in HTML.

a. <input>   b. <select>   c. <textarea>   d. <table>

18. ________ tag defines an ordered list in HTML.

a. <UL>   b.<LI>   c. <OL>   d. <DL>

19.  _________ attribute defines ordered listing like A,B,C etc.

a. li     b. type   c. src   d. name

20. _________ attribute specifies an inline style for an element in HTML.

a.  src       b. style   c. source    d. class

 

21.______ attribute specifies script to be run when a document unload

a. OnClick        b. OnLoad        c. OnUnload          d. OnKeyPress

22. ______ attribute specifies script to be run when an element loses foucus.

a. OnClick      b. OnBlur    c. OnSubmit       d. OnLoad

23.  _________ tag defines Strikethrough text in HTML.

a. <S>    b. <B>    c. <Stk>         d. <strikethough>

 24. ______ tag defines subscripted text in HTML.

a. <strike>         b. <sup>         c. <sub>      d. <s>

25. ________ attribute specifies the background color of a document.

a. Backcolor     b. Color     c. Bgcolor      d. Background

26. ________ attribute specifies the background image of a document.

a. Backcolor     b. img    c. src      d. Background

27. ________ attribute specifies the  color of an active link in a document.

a. Link       b. Backcolor    c. Alink       d. Color

28. __________ tag display horizontal line in HTML document.

a. <H1>   b.<HR>   c. <BR>         d. <Horizontal>

29. __________ attribute specifies the font style of text in HTML document.

a. Font         b. Style      c. Face       d. Fontname

30. A __________ tag is a list of items, with a description of each item in HTML document.

a. <DD>         b. <OL>      c. <UL>       d. <DL>

31. To create a link to another document, by using the _______ attribute in HTML.

a.  href       b. style      c. link     d.  list

32. In Html  width and height of the image specify with _________

a.  Pixels         b. numbers        c. meters      d. cms

33. ___________character used to give the name or id of the map element in Image Mapping in HTML.

a. %          b.       c. &       d. $

34. ____________ tag is used for image mapping in HTML.

a. <MAP>    b. <img>      c. <AREA>       d. <IMAGE>

35. ________ attribute used for server side image mapping in HTML.

a. <A>            b. href          c. USEMAP    d. ISMAP

36.  _________ attribute specifies the space between the cell wall and the cell content in Table.

a. border        b. cellpadding  c. cellspacing     d. spacing

 37. _________attribute specifies the space between cells in Table.

a. border        b. cellpadding  c. cellspacing     d. spacing

38. __________ tag defines the sub window in web page.

a. <frameset>        b. <body>     c.<frame>        d. <noframes>

39. _________ attribute specifies the number and size of columns in a frameset in HTML.

a. columns        b. cols        c. rows      d. rownumber

40. ________ attribute used in both tage <img> and <frameset> in HTML.

a.   source       b. src           c. href       d.    class

41. ________ attribute specifies that an <input> element should be pre selected when the page loads.

a. enabled        b. checked     c. visible   d. selected

42. _________ attribute specifies the maximum number of characters  allowed in <input> element.

a. maximumlength   b.maxlength     c. length      d. size

43. The _________ tag defines a multi-line text input control in HTML.

a. <input>          b. <text>       c. <textarea>        d. <textbox>

44. The _________ tag is used to create a select list(drop-down) list in HTML.

a. <select>        b. <input>       c. <textbox>        d. <option>

45. _______ value used in type attribute of <input> tag to select only one of a limited number of choices in HTML.

a. option       b. radio             c. password    d. checkbox

46. _______ method sends the form-data as an HTTP post transaction in <form> tag.

a. send        b. post       c. get          d. receive

47. _______ tag defines the relationship between a document and external resource in HTML.

a. <a>       b. <rel>          c. <link>           d. <input>

48. Style attribute used in ________ type of CSS.

a. internal         b. external          c. inline        d.   input

49. To change the background color __________ property used in CSS.

a. bgcolor        b. background-color       c. backcolor        d. color

50. __________ property used to change the font in CSS.

a. font-size       b. font-name      c. font-family       d. font-style





Comments

Popular posts from this blog

SYBMS - SEM IV - MCQ

SYBCOM - SEM III - MCQ

MU circular on current year 2020-21 examinations and practicals