Tcs Qestion
Tcs Qestion
A. JRD Tata
B. F.C Kohli
C. Ratan Tata
D. S. Ramadorai
Answer Key: B
A. 2006
B. 1999
C. 2004
D. 2002
Answer Key: C
TCS is listed on which stock exchanges?
A. BSE and CSE
B. BSE and NSE
C. CSE, BSE and NSE
D. BSE, NSE and Nasdaq
2. TCS ASPIRE: Basic Programming Quiz
# Question 1 of 10 10.0 Points
What is a variable in a computer program?
A. An output
B. A value such as 5
C. The name given to a value
D. An input argument
Answer Key: C
D. A sequence of instructions
A. None
B. a Process
C. a file or a process
D. a File
Answer Key: C
# Question 5 of 10 10.0 Points
Which command is used for changing directory in UNIX?
A. mkdir
B. cd
C. chgdir
D. cddir
Answer Key: B
# Question 6 of 10 10.0 Points
In UNIX, file permissions are not set for
A. User
B. Other users
C. Devices
D. User Groups
Answer Key: C
# Question 7 of 10 10.0 Points
In Unix, how can you read the manual help pages about a command
A. Type help and the command
B. Type options and the command
C. Type details and the command
D. Type man and the command
Answer Key: D
True
False
Answer Key: True
# Question 2 of 10 10.0 Points
Some examples of non-functional requirements are.
1.Number of significant digits to which accuracy should be maintained in all
numerical calculations is 10 2.The response time of the system should always
be less than 5 seconds
3.The software should be developed using C language on a UNIX based
system
4.The matrix diagonalisation routine should zero out all off-diagonal
elements, which are equal to or less than 10-3
5.Experienced officers should be able to use all the system functions after a
total training of two hours. After this training, the average number of errors
made by experienced officers should not exceed two per day.
True
False
Answer Key: True
# Question 3 of 10 10.0 Points
Every software system has the following essential characteristics:
A. It has processes which collaborate with each other to generate the
outputs.
B. All the above
C. It has a boundary. The boundary separates what is with in system scope
and what is outside.
D. The system may also use data stores to store data which has a life beyond
the system.
E. These processes operate on data by creating, modifying, destroying, and
querying it.
F. It takes inputs from external agents and generates outputs.
Answer Key: B
# Question 4 of 10 10.0 Points
ERD complements DFD. While DFD focuses on data and the relationships
between them, ERD focuses on processes and data flow between them
True
False
Answer Key: False
# Question 5 of 10 10.0 Points
Polymorphism: It is the means by which an operation behaves differently in
different contexts.
True
False
Answer Key: True
# Question 6 of 10 10.0 Points
Encapsulation: This helps in controlling the visibility of internal details of the
objects. It improves security and integrity of data
True
False
Answer Key: True
# Question 7 of 10 10.0 Points
There are 4 types of Abstraction, namely Entity, Action, Virtual machine &
Coincidental.
True
False
Answer Key: True
# Question 8 of 10 10.0 Points
There can be more than one hash fields on a file.
True
False
Answer Key: False
# Question 9 of 10 10.0 Points
Concurrency refers to multiple transactions accessing the same database at
the same time. In a system which allows concurrency, some kind of control
mechanism has to be in place to ensure that concurrent transactions do not
interfere with each other.
True
False
Answer Key: True
# Question 10 of 10 10.0 Points
Software genetic development process contains three genetic phrases
namely
A. Software engineering, Definition, Coding
B. Definition, development, maintenance
C. Coding, design, Software engineering
D. Design, Coding, Development
E. Development, Definition, Testing
Answer Key: B
Answer Key: A
# Question 2 of 10 10.0 Points
In which of the following ways does TRUNCATE TABLE differ from DELETE?
A. All of the above
B. The number of deleted rows are not returned.
C. Truncate operations are not transaction safe.
D. Truncate operations drop and re-create the table which is much faster than
deleting rows. one by one.
Answer Key: A
# Question 3 of 10 10.0 Points
Following tasks can be performed when using the ALTER TABLE
clause:
1.Change the name of the table
2.Change the name of the column
3.Decrease the size of a column if table data exists.
True
False
Answer Key: False
# Question 4 of 10 10.0 Points
Sometimes tables within particular database become obsolete and ought to
be discarded. Which of the following commands would you use for the same?
A. None of the above
B. REMOVE TABLE < TABLE NAME>
C. DROP TABLE < TABLE NAME >
D. DELETE TABLE < TABLE NAME >
Answer Key: C
# Question 5 of 10 10.0 Points
A foreign key must have a corresponding primary key or unique key value in
the master table.
True
False
Answer Key: True
# Question 6 of 10 10.0 Points
NULL value is equivalent to a value of Zero if the data type is number
True
False
Answer Key: False
# Question 7 of 10 10.0 Points
Integrity constraint can be dropped if the rule that it enforces is not longer
TRUE or if the constraint is no longer needed.
True
False
Answer Key: True
# Question 8 of 10 10.0 Points
SELECT TRIM( Hansel ) Trim both sides FROM DUAL What would be the
output of the above command?
A. None of the above
B. Trim both sides
C. Hansel
D. Trim both sides Hansel
Answer Key: D
# Question 9 of 10 10.0 Points
What would be the output of following command. SELECT
TRANSLATE(1sct523,123, 7a9) Change FROM DUAL;
A. 7sct 5a9
Which option among the following lists only Java programming language
keywords?
A. goto, instanceof, native, finally, default, throws
B. byte, break, assert, switch, include
C. try, virtual, throw, final, volatile, transient
D. strictfp, constant, super, implements, do
E. class, if, void, long, Int, continue
Answer Key: goto, instanceof, native, finally, default, throws
# Question 3 of 10 10.0 Points
Which of the following options would legally declare, construct, and initialize
an array?
A. int [] myList = {1, 2, 3};
B. int myList [] = {4, 3, 7};
C. int [] myList = (5, 8, 2);
D. int myList [] [] = {4,9,7,0};
Answer Key: int myList [] = {4, 3, 7};
# Question 4 of 10 10.0 Points
You want subclasses in any package to have access to members of a
superclass. Which is the most restrictiveaccess that accomplishes this
objective?
A. private
B. transient
C. public
D. protected
Answer Key: Public
# Question 5 of 10 10.0 Points
interface Base { boolean m1 (); byte m2(short s); }
1.interface Base2 implements Base {}
2.abstract class Class2 extends Base { public boolean m1(){ return true; }}
3.abstract class Class2 implements Base {}
4.abstract class Class2 implements Base { public boolean m1(){ return (7 >
4); }}
5.abstract class Class2 implements Base { protected boolean m1(){ return (5
> 7) }}
A. 3 and 4
B. 1 and 5
C. 1 and 2
D. 2 and 3
Answer Key: 3 and 4
# Question 6 of 10 10.0 Points
Among the 6 options provided below, which three form part of correct array
declarations?
1.public int a [ ]
2.static int [ ] a
3.public [ ] int a
4.private int a [3]
5.private int [3] a [ ]
6.public final int [ ] a
A. 2, 4, 5
B. 1, 3, 4
C. 2, 5, 6
D. 1, 2, 6
Answer Key: 1, 2, 6
# Question 7 of 10 10.0 Points
Which of the following is/are legal method declarations?
A. <div> </div>
B. None
C. <p>
D. <span></span>
In an HTML document, which is the correct place to refer to an external style
sheet?
A. In the <body> section
B. In the <head> section
C. At the end of the document
D. At the beginning of the document
Question 1 of 10 10.0 Points
How would you define First-line pseudo-element in CSS?
A. select:pseudo-element {property: value}
B. selector:pseudo-elements {property: values}
C. selector:pseudo-element {property: value}
D. None of the options
Question 4 of 10 10.0 Points
Among the following options, choose the correct syntax used for external
CSS?
A. <style type=text/css>
body {background-color: red}
</style>
B. None
C. <link rel=stylesheet type=text/css href=r4rcss.css>
Here r4rcc.css is in to same directory .
D. Both
1.What is the correct syntax of the declaration which defines the XML
version?
Option:
a. < ? xml version=1.0 ? >
b. < xml version=1.0 />
c. < xml version=1.0? />
d. None of the above
e. < ? xml version=1.0 ? />
Ans: a
2.What is the correct syntax for referring to an external script called xxx.js?
option: a. None
b. < script type=text/javascript name=xxx.js >
c. < script type=text/javascript href=xxx.js >
d. < script type=text/javascript src=xxx.js >
ans: d
3. What is the correct HTML for referring to an external style sheet?
option : a. < stylesheet>mystyle.css
b. None of the above
c. < style src=mystyle.css />
d. < link =stylesheet type=text/css/script href=mystyle.css >
e. < link rel=stylesheet type=text/css href=mystyle.css />
Ans: e
4. What can you use to replace like with hate in I like Eminem?
Option : a. preg_replace(/like/, /hate/, I like Eminem)
b. preg_replace(hate, like, I like Eminem)
c. preg_replace(/like/, hate, I like Eminem)
d. None of the above
0b88acea2d2a393515f6bf38f2 ></a>
D. <a attach=\page.htm\ ></a>
ans- c
QSTN-How would you set a CSS comment?
ANS- /*, */,
QSTN-How would you define CSS padding?
ANS-p {padding: 2%; border: 1px solid black; }
h5{padding: 0px; border: 1px solid red;}
QSTN- Which of the following popup boxes would you use to get some
information from the user?
ANS-prompt
Only Answers, no ques :P
. td.test1 {padding: 2.0cm}
Case incensitive
B. <script type=text/javascript></script>
E. Is used to break a line.
D. <script src= abc.js>
B. How to display HTML elements
True
C. id selector as #
B. prompt(Write here some text,Write default value here)