0% found this document useful (0 votes)
10 views152 pages

IT Exit Model 2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views152 pages

IT Exit Model 2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 152

Which of the following PHP functions is used to connect to a

MySQL database?

a.

mysql_con()

b.

mysqli_connect()

c.

pg_connect()

d.

db_connect()

Feedback

The correct answer is: mysqli_connect()

Question 2

Complete

Mark 1.00 out of 1.00


Remove flag

Question text

Which one of the following is NOT the components of frames?

a.

MAC address of the source

b.

IP address of the destination

c.

Control options

d.

Data

Feedback

The correct answer is: IP address of the destination

Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which PHP superglobal is used to collect form data sent via the
HTTP POST method?

a.

$_POST

b.

$_GET

c.

$_REQUEST

d.

$_FORM
Feedback

The correct answer is: $_POST

Question 4

Complete

Mark 0.00 out of 1.00

Flag question

Question text

In PHP, which function is used to fetch the next row from a result
set as an associative array?

a.

mysqli_fetch_row()

b.

mysqli_fetch_array()

c.

mysqli_fetch_assoc()
d.

mysqli_fetch_object()

Feedback

The correct answer is: mysqli_fetch_assoc()

Question 5

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is a network-level security control?

a.

Firewalls

b.

Antivirus software
c.

Security awareness training

d.

Vulnerability scanning

Feedback

The correct answer is: Firewalls

Question 6

Complete

Mark 1.00 out of 1.00

Flag question

Question text

____________ is money that has been spent in the past.

a.

Direct cost
b.

Indirect cost

c.

Sunk cost

d.

All of the above

Feedback

The correct answer is: Sunk cost

Question 7

Complete

Mark 1.00 out of 1.00

Flag question

Question text

The insulation of data from direct access by the program is called


as _________________
a.

Data hiding

b.

Inheritance

c.

Abstraction

d.

Interface

Feedback

The correct answer is: Data hiding

Question 8

Complete

Mark 0.00 out of 1.00


Flag question

Question text

Which method is used to retrieve a value from SharedPreferences?

a.

getInt("key")

b.

getString("key",null)

c.

getBoolean(0,"key")

d.

getAll()

Feedback

The correct answer is: getString("key",null)

Question 9
Complete

Mark 0.00 out of 1.00

Flag question

Question text

A transaction A holds shared lock X. If transaction B also requests


for shared lock on X___

a.

It will result in a deadlock situation

b.

It will immediately be rejected

c.

It will immediately be granted

d.

It‘ll be granted as soon as released by A


Feedback

The correct answer is: It will immediately be granted

Question 10

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is the main purpose of the Domain Name System (DNS)?

a.

To store website files

b.

To resolve domain names to IP addresses

c.

To encrypt web traffic


d.

To manage web hosting services

Feedback

The correct answer is: To resolve domain names to IP addresses

Question 11

Complete

Mark 0.00 out of 1.00

Flag question

Question text

_______ is a block of Recovery Manager (RMAN) job commands that


is stored in the recovery catalog.

a.

Recovery procedure

b.

Recovery block
c.

Stored block

d.

Stored script

Feedback

The correct answer is: Stored script

Question 12

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which programming languages are primarily used for creating


client-side web applications?

a.

Java and C++


b.

PHP and Python

c.

HTML, CSS, and JavaScript

d.

SQL and Ruby

Feedback

The correct answer is: HTML, CSS, and JavaScript

Question 13

Complete

Mark 1.00 out of 1.00

Flag question

Question text
An entity in A is associated with at least one entity in B, and an
entity in B is associated with at most one entity in A. This is called
as___________?

a.

One-to-many

b.

One-to-one

c.

Many-to-many

d.

Many-to-one

Feedback

The correct answer is: Many-to-one

Question 14

Complete

Mark 1.00 out of 1.00


Flag question

Question text

What is the purpose of a computer's device drivers?

a.

To manage the computer's power

b.

To provide a user interface

c.

To allow the OS to communicate with hardware

d.

To control the computer's input/output

Feedback

The correct answer is: To allow the OS to communicate with


hardware

Question 15
Complete

Mark 0.00 out of 1.00

Flag question

Question text

Which of the following is NOT a common technique used for


software requirement validation?

a.

Reviews with stakeholders

b.

Unit testing

c.

User interface mockups

d.

Prototyping
Feedback

The correct answer is: Unit testing

Question 16

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which operator is used to increment a variable by a specific value


in C++?

a.

b.

++

c.

+=
d.

*=

Feedback

The correct answer is: +=

Question 17

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Why would a Layer 2 switch need an IP address?

a.

To enable the switch to be managed remotely

b.

To enable the switch to receive frames from attached PCs


c.

To enable the switch to send broadcast frames to attached PCs

d.

To enable the switch to function as a default gateway

Feedback

The correct answer is: To enable the switch to be managed


remotely

Question 18

Complete

Mark 0.00 out of 1.00

Flag question

Question text

______________________displays the configuration of run-time


processing elements and the software components, processes, and
objects that live on them

a.
Activity Diagram

b.

Deployment Diagram

c.

Class Diagram

d.

Component Diagram

Feedback

The correct answer is: Deployment Diagram

Question 19

Complete

Mark 0.00 out of 1.00

Flag question

Question text
Which of the following tags is used to create a hyperlink in HTML?

a.

<link>

b.

<a>

c.

<href>

d.

<url>

Feedback

The correct answer is: <a>

Question 20

Complete

Mark 1.00 out of 1.00


Flag question

Question text

One of the following is an object created from a class and


represents current state?

a.

Class

b.

Instance

c.

Property

d.

Method

Feedback

The correct answer is: Instance

Question 21
Complete

Mark 0.00 out of 1.00

Flag question

Question text

Which is not the Classification of user interface prototyping?

a.

Presentation Prototypes

b.

Bread board

c.

Selecting Prototypes

d.

Pilot systems

Feedback
The correct answer is: Selecting Prototypes

Question 22

Complete

Mark 0.00 out of 1.00

Flag question

Question text

The section of the project management plan that describes


management and technical approaches should include the
following information:

a.

The project names

b.

Project control

c.

The sponsor names


d.

All of the above

Feedback

The correct answer is: All of the above

Question 23

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Which of the following is a common use of server-side scripting?

a.

Validating user input on the client side

b.

Generating dynamic content based on user input


c.

Styling HTML documents

d.

Managing browser cookies

Feedback

The correct answer is: Generating dynamic content based on user


input

Question 24

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is a protocol used for transferring web


pages on the Internet?

a.
FTP

b.

HTTP

c.

SMTP

d.

SSH

Feedback

The correct answer is: HTTP

Question 25

Complete

Mark 0.00 out of 1.00

Flag question

Question text
Which of the following is not a built-in data type in C++?

a.

Int

b.

Float

c.

String

d.

Char

Feedback

The correct answer is: String

Question 26

Complete

Mark 1.00 out of 1.00


Flag question

Question text

A relationship in which the “from” activity or predecessor must


finish before the “to” activity or successor can start is called
--------------------------------.

a.

Finish to start dependency

b.

Start to finish dependency

c.

Finish to finish dependency

d.

All of the above

Feedback

The correct answer is: Finish to start dependency

Question 27
Complete

Mark 0.00 out of 1.00

Flag question

Question text

One of the following the indicates ratio of earned value to actual


cost; it can be used to estimate the projected cost of completing
the project.

a.

The cost performance index (CPI)

b.

Cost variance (CV)

c.

The rate of performance (RP)

d.

All of the above


Feedback

The correct answer is: The cost performance index (CPI)

Question 28

Complete

Mark 1.00 out of 1.00

Flag question

Question text

In component level design, the functionality that is delivered by a


component should be ____________________ that is ,it should focus on
one and only one function.

a.

Coupling

b.

Cohesive

c.
Information domain

d.

None

Feedback

The correct answer is: Cohesive

Question 29

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Which JavaScript method is used to write content into an HTML


document?

a.

document.write()

b.
document.createElement()

c.

document.appendChild()

d.

document.innerHTML()

Feedback

The correct answer is: document.write()

Question 30

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is correct about Broadcast Receivers?

a.
Broadcast classes are created by extending the super class
BroadcastReceiver

b.

Broadcast classes are created by extending the super class


BroadcastReceiver and overriding the onReceive method

c.

Broadcast Receivers actively listen for button clicks and respond in


GUI

d.

Broadcast receivers are used to handle the GUI events

Feedback

The correct answer is: Broadcast classes are created by extending


the super class BroadcastReceiver and overriding the onReceive
method

Question 31

Complete

Mark 1.00 out of 1.00


Flag question

Question text

Consider two tuples X and Y, the operation whose result includes


tuples that are only in X but not in Y is classified as

a.

Union of relation X and Y

b.

Intersection of relation X and Y

c.

Difference of relation X and Y

d.

Square of relation X and Y

Feedback

The correct answer is: Difference of relation X and Y

Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Given three classes A, B and C, where class C is derived from class


B, which is derived from class A. If those classes are public classes
and found in different package, then a class C object can access

a.

Any data in C and Only Protected and public data in A and B.

b.

Protected, default and public data only in C and B.

c.

Any data in C and only public data in A and B.

d.

Protected, default and public data only in C.


Feedback

The correct answer is: Any data in C and only public data in A and
B.

Question 33

Complete

Mark 1.00 out of 1.00

Flag question

Question text

In log-based recovery, the log is a sequence of ______

a.

Filter

b.

Records

c.

Blocks
d.

Numbers

Feedback

The correct answer is: Records

Question 34

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of thermal paste between a CPU and its


heatsink?

a.

To improve heat transfer

b.

To protect the CPU from damage


c.

To enhance electrical conductivity

d.

To prevent dust buildup

Feedback

The correct answer is: To improve heat transfer

Question 35

Complete

Mark 1.00 out of 1.00

Flag question

Question text

The deadlock state can be changed back to stable state by using


_____________ statement.

a.

Commit
b.

Rollback

c.

Savepoint

d.

Deadlock

Feedback

The correct answer is: Rollback

Question 36

Complete

Mark 1.00 out of 1.00

Flag question

Question text

The primary function of an information security risk assessment is


to____
a.

Identify and evaluate potential threats and vulnerabilities

b.

Implement security controls

c.

Ensure compliance with regulations

d.

Reduce IT operational costs

Feedback

The correct answer is: Identify and evaluate potential threats and
vulnerabilities

Question 37

Complete

Mark 1.00 out of 1.00


Flag question

Question text

How does the service password-encryption command enhance


password security on Cisco routers and switches?

a.

It requires encrypted passwords to be used when connecting


remotely to a router or switch with Telnet.

b.

It encrypts passwords that are stored in router or switch


configuration files.

c.

It requires that a user type encrypted passwords to gain console


access to a router or switch.

d.

It encrypts passwords as they are sent across the network.

Feedback

The correct answer is: It encrypts passwords that are stored in


router or switch configuration files.
Question 38

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which command is used in order to see interface descriptions and


speed and duplex settings?

a.

Show ip interface brief

b.

Show vlan brief

c.

Show running-config interface

d.
Show ip route

Feedback

The correct answer is: Show ip interface brief

Question 39

Complete

Mark 1.00 out of 1.00

Flag question

Question text

___________ is set of components that mediates interaction between


the program and the database

a.

Data Set

b.

Data Table

c.
Data Provider

d.

Data Relation

Feedback

The correct answer is: Data Provider

Question 40

Complete

Mark 1.00 out of 1.00

Flag question

Question text

A _______________ is the application of knowledge, skills, tools, and


techniques to project activities to meet project requirements.

a.

Operation

b.
Project

c.

Project Management

d.

IT project Management

Feedback

The correct answer is: Project Management

Question 41

Complete

Mark 0.00 out of 1.00

Flag question

Question text

How do you identify a faulty RAM module in a computer?

a.
Run a memory testing utility

b.

Check the computer's BIOS settings

c.

Inspect the physical RAM modules

d.

All of the above

Feedback

The correct answer is: All of the above

Question 42

Complete

Mark 1.00 out of 1.00

Flag question

Question text
Runtime polymorphism feature in java is

a.

Method overriding

b.

Method overloading

c.

Operator overloading

d.

Constructor overloading

Feedback

The correct answer is: Method overriding

Question 43

Complete

Mark 0.00 out of 1.00


Flag question

Question text

One of the following is a network interface to application


functionality based on standard internet technology?

a.

ADO.NET

b.

ASP.NET

c.

Web services

d.

Winforms

Feedback

The correct answer is: Web services

Question 44
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is a transaction log in DBMS?

a.

A log of all the queries executed on the database

b.

A log of all the locks acquired during transactions

c.

A log of all the database schema changes

d.

A log of all the transactions executed on the database

Feedback
The correct answer is: A log of all the transactions executed on the
database

Question 45

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is False about when to use RAD


application?

a.

Reasonably well-known requirements

b.

User involved throughout the life cycle

c.

Functionality delivered in increments


d.

High performance required

Feedback

The correct answer is: High performance required

Question 46

Complete

Mark 1.00 out of 1.00

Flag question

Question text

____________________tie together data and behavior into a single unit


know as Class.

a.

Data hiding

b.

Inheritance
c.

Abstraction

d.

Encapsulation

Feedback

The correct answer is: Encapsulation

Question 47

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Checkpoints are a part of ______ measures.

a.

Authorization
b.

Concurrency

c.

Recovery

d.

Security

Feedback

The correct answer is: Recovery

Question 48

Complete

Mark 1.00 out of 1.00

Flag question

Question text

_____________is the number of tuples participating in a relationship.


a.

Cardinality

b.

Degree

c.

Domain

d.

Set

Feedback

The correct answer is: Cardinality

Question 49

Complete

Mark 1.00 out of 1.00


Flag question

Question text

What is the function of a computer's BIOS (Basic Input/Output


System)?

a.

To manage the operating system

b.

To provide a user interface

c.

To perform hardware initialization

d.

To control the computer's power

Feedback

The correct answer is: To perform hardware initialization

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

How can you retrieve a value from a URL parameter in PHP?

a.

$_POST['param']

b.

$_GET['param']

c.

$_REQUEST['param']

d.

$_URL['param']

Feedback
The correct answer is: $_GET['param']

Question 51

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Three or more devices share a link in ________ connection.

a.

Unipoint

b.

Multipoint

c.

Point to point
d.

Simplex

Feedback

The correct answer is: Multipoint

Question 52

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which two features of object-oriented programming are the same?

a.

Abstraction and Polymorphism features are the same

b.

Inheritance and Encapsulation features are the same


c.

Encapsulation and Polymorphism features are the same

d.

Encapsulation and Abstraction

Feedback

The correct answer is: Encapsulation and Abstraction

Question 53

Complete

Mark 0.00 out of 1.00

Flag question

Question text

The selection condition of SELECT operator is considered as

a.

Row expression
b.

Column expression

c.

String expression

d.

Boolean expression

Feedback

The correct answer is: Boolean expression

Question 54

Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which one of the following is the IT project integration
management processes that involves carrying out the project
management plan by performing the activities included in it?

a.

Developing the project charter

b.

Developing the project management plan

c.

Directing and controlling the project

d.

All of the above

Feedback

The correct answer is: Directing and controlling the project

Question 55

Complete

Mark 0.00 out of 1.00


Flag question

Question text

__________ prototyping is generally limited function, limited


interaction prototyping effort.

a.

High-fidelity

b.

Low-fidelity

c.

Throw-away

d.

Evolutionary prototyping

Feedback

The correct answer is: Low-fidelity

Question 56
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which SQLiteOpenHelper method is used for writing, updating or


deleting data?

a.

getReadableDatabase()

b.

update()

c.

insert()

d.

getWritableDatabase()
Feedback

The correct answer is: getWritableDatabase()

Question 57

Complete

Mark 1.00 out of 1.00

Flag question

Question text

A process that helps switch to remove old entries and free memory
of MAC address table to add new entries is called?

a.

Formating

b.

Learning

c.

Aging
d.

Flooding

Feedback

The correct answer is: Aging

Question 58

Complete

Mark 0.00 out of 1.00

Flag question

Question text

What is the term for an endpoint of an inter-process


communication flow across a computer network?

a.

port

b.

machine
c.

socket

d.

pipe

Feedback

The correct answer is: socket

Question 59

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Most backup and recovery commands in _____ are executed by


server sessions.

a.

Backup Manager
b.

Recovery Manager

c.

Backup and Recovery Manager

d.

Database Manager

Feedback

The correct answer is: Recovery Manager

Question 60

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Which among the following classes is suitable for displaying


notifications?
a.

NotificationChannel

b.

NotificationManager

c.

NotificationCompat.Builder

d.

notify(id,b.build())

Feedback

The correct answer is: NotificationManager

Question 61

Complete

Mark 1.00 out of 1.00


Flag question

Question text

Which statements accurately describe an advantage when


deploying NAT for IPv4 in a network?

a.

NAT will impact negatively on switch performance.

b.

NAT causes routing tables to include more information.

c.

NAT adds authentication capability to IPv4.

d.

NAT provides a solution to slow down the IPv4 address depletion.

Feedback

The correct answer is: NAT provides a solution to slow down the
IPv4 address depletion.

Question 62
Complete

Mark 0.00 out of 1.00

Flag question

Question text

Projection of columns in relational algebra operation creates

a.

horizontal partitioning

b.

vertical partitioning

c.

combination of attributes

d.

All except C

Feedback
The correct answer is: vertical partitioning

Question 63

Complete

Mark 0.00 out of 1.00

Flag question

Question text

One of the following is FALSE about form?

a.

Form is control placed in user interface element of a windows


application.

b.

Form is an area on the screen (usually rectangular) over which you


design the user interface of a Windows application.

c.

Form is a control, but it is a special type of control that is both


scrollable and capable of acting as a container control.
d.

Windows forms controls are reusable components that


encapsulate graphical user interface (GUI) functionality.

Feedback

The correct answer is: Form is control placed in user interface


element of a windows application.

Question 64

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which layer does the data link layer take packets from and
encapsulate them into frames for transmission?

a.

transport layer

b.
application layer

c.

network layer

d.

physical layer

Feedback

The correct answer is: network layer

Question 65

Complete

Mark 1.00 out of 1.00

Flag question

Question text

A key principle of secure system architecture is:

a.
Centralization

b.

Modularity

c.

Openness

d.

Complexity

Feedback

The correct answer is: Modularity

Question 66

Complete

Mark 1.00 out of 1.00

Flag question

Question text
What is a constant in C++?

a.

A fixed value that cannot be changed

b.

A reserved word with predefined meaning

c.

A named storage location that can hold a value

d.

An output produced by a program

Feedback

The correct answer is: A fixed value that cannot be changed

Question 67

Complete

Mark 1.00 out of 1.00


Flag question

Question text

What is the purpose of curly braces ({}) in a C++ program?

a.

To define a function

b.

To indicate the beginning and end of a block of code

c.

To declare variables

d.

To provide input to the program

Feedback

The correct answer is: To indicate the beginning and end of a block
of code

Question 68
Complete

Mark 1.00 out of 1.00

Flag question

Question text

In the OSI model, as a data packet moves from the lower to the
upper layers, headers are _______

a.

Added

b.

Removed

c.

Rearranged

d.

Randomized
Feedback

The correct answer is: Removed

Question 69

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is the primary difference between include() and require() in


PHP?

a.

include() will include a file only once, while require() will include it
every time it is called

b.

require() will produce a fatal error and stop the script if the file is
not found, while include() will only produce a warning

c.
require() is used for including files, include() is used for importing
libraries

d.

There is no difference between include() and require()

Feedback

The correct answer is: require() will produce a fatal error and stop
the script if the file is not found, while include() will only produce a
warning

Question 70

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of the address operator (&) in C++?

a.

To declare a variable
b.

To access the value of a variable

c.

To assign a value to a variable

d.

To obtain the memory address of a variable

Feedback

The correct answer is: To obtain the memory address of a variable

Question 71

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Course (Course_ Id, Section, Semester), here the Course_ Id, Section
and Semester are __________ and course is a _________.
a.

Relations, Attribute

b.

Attributes, Relation

c.

Attribute, Tuple

d.

Tuple, Attributes

Feedback

The correct answer is: Attributes, Relation

Question 72

Complete

Mark 1.00 out of 1.00


Flag question

Question text

Which of the following best describes a static website?

a.

A website that changes its content based on user interactions

b.

A website that does not change its content unless manually


updated

c.

A website that uses server-side scripting to generate dynamic


content

d.

A website that requires user authentication to access content

Feedback

The correct answer is: A website that does not change its content
unless manually updated
Question 73

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following block used to add any code that is
always executed regardless of whether or not an exception is
thrown?

a.

Finally

b.

Catch

c.

Try
d.

Thrown

Feedback

The correct answer is: Finally

Question 74

Complete

Mark 1.00 out of 1.00

Flag question

Question text

_____ is a device that converts the digital signals generated by a


computer into analog signals that can travel over conventional
phone lines.

a.

Modem

b.
Firewall

c.

Gateway

d.

Repeater

Feedback

The correct answer is: Modem

Question 75

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Among the provided options,the layout that arranges its views in a


stack order is

a.
Relative Layout

b.

Card Layout

c.

Frame Layout

d.

Constraint Layout

Feedback

The correct answer is: Relative Layout

Question 76

Complete

Mark 0.00 out of 1.00

Flag question

Question text
A network administrator is adding a new LAN to a branch office.
The new LAN must support 25 connected devices. What is the
smallest network mask that the network administrator can use for
the new network?

a.

255.255.255.224

b.

255.255.255.192

c.

255.255.255.240

d.

255.255.255.128

Feedback

The correct answer is: 255.255.255.128

Question 77

Complete

Mark 1.00 out of 1.00


Flag question

Question text

Which information does the show startup-config command


display?

a.

The IOS image copied into RAM

b.

The bootstrap program in the ROM

c.

The contents of the saved configuration file in the NVRAM

d.

The contents of the current running configuration file in the RAM

Feedback

The correct answer is: The contents of the saved configuration file
in the NVRAM

Question 78
Complete

Mark 1.00 out of 1.00

Flag question

Question text

When handling form data in PHP, which attribute of the HTML


<form> tag specifies how the form data should be sent to the
server?

a.

action

b.

method

c.

enctype

d.

target
Feedback

The correct answer is: method

Question 79

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which control statement is used for executing different blocks of


code based on multiple conditions?

a.

If...else statement

b.

Switch statement

c.

For loop statement


d.

While loop statement

Feedback

The correct answer is: Switch statement

Question 80

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following statements not true?

a.

A private member of a class cannot be accessed by the methods of


the same class

b.

A public member of a class can be accessed in all the packages


c.

A private member of a class cannot be accessed from its derived


class

d.

A protected member of a class can be accessed from its derived


class.

Feedback

The correct answer is: A private member of a class cannot be


accessed by the methods of the same class

Question 81

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following statement is correct, when an overridden


method is called from within a subclass?

a.
The Compiler will choose randomly the method to be executed

b.

It will always refer to the version of that method defined by the


subclass

c.

Compile time error will occur

d.

It will always refer to the version of that method defined by the


superclass

Feedback

The correct answer is: It will always refer to the version of that
method defined by the superclass

Question 82

Complete

Mark 1.00 out of 1.00

Flag question
Question text

Which of the following can be a multivalued attribute?

a.

Email Address

b.

Gender

c.

Date-of-birth

d.

Age

Feedback

The correct answer is: Email Address

Question 83

Complete

Mark 0.00 out of 1.00


Flag question

Question text

If a link transmits 4000 frames per second, and each slot has 8 bits,
what is the transmission rate of the circuit using Time Division
Multiplexing (TDM)?

a.

500kbps

b.

32kbps

c.

32bps

d.

500bps

Feedback

The correct answer is: 32kbps

Question 84
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not an OOPS concept?

a.

Encapsulation

b.

Polymorphism

c.

Exception

d.

Abstraction

Feedback
The correct answer is: Exception

Question 85

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which method is used to stop a bound service?

a.

System.exit(0)

b.

selfStop()

c.

stopService()
d.

None

Feedback

The correct answer is: None

Question 86

Complete

Mark 1.00 out of 1.00

Flag question

Question text

_____ is an essential part of any backup system.

a.

Filter

b.

Recovery
c.

Security

d.

Scalability

Feedback

The correct answer is: Recovery

Question 87

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Which attribute of the HTML <form> tag specifies the URL of the
page that will process the form data?

a.

action
b.

method

c.

enctype

d.

target

Feedback

The correct answer is: action

Question 88

Complete

Mark 1.00 out of 1.00

Flag question

Question text

___________ is sequence of bytes traveling from a source to a


destination over a communication path?
a.

File

b.

Stream

c.

Record

d.

Field

Feedback

The correct answer is: Stream

Question 89

Complete

Mark 0.00 out of 1.00


Flag question

Question text

A USB port can connect upto_________different peripherals together


with single connector?

a.

125

b.

126

c.

127

d.

128

Feedback

The correct answer is: 127

Question 90
Complete

Mark 0.00 out of 1.00

Flag question

Question text

How do you troubleshoot a computer that fails to boot up?

a.

Check the monitor and keyboard

b.

Run a virus scan

c.

Check the power supply, RAM, and boot device

d.

All of the above

Feedback
The correct answer is: All of the above

Question 91

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which loop statement is guaranteed to execute its body at least


once?

a.

If...else statement

b.

Switch statement

c.

For loop statement


d.

Do...while statement

Feedback

The correct answer is: Do...while statement

Question 92

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is the correct way to start a PHP block of code?

a.

&lt;?php ?&gt;

b.

&lt;php ?&gt;
c.

&lt;% %&gt;

d.

&lt;script php&gt;

Feedback

The correct answer is: &lt;?php ?&gt;

Question 93

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What does the CSS property margin do?

a.

Sets the space inside the border of an element


b.

Sets the space outside the border of an element

c.

Sets the thickness of an element's border

d.

Sets the background color of an element

Feedback

The correct answer is: Sets the space outside the border of an
element

Question 94

Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which among the following methods is suitable for storing an
integer data in a shared preference file?

a.

put(key,2)

b.

put(key,"2")

c.

putInt(key,2)

d.

putInt(key,"2")

Feedback

The correct answer is: putInt(key,2)

Question 95

Complete

Mark 0.00 out of 1.00


Flag question

Question text

Which of the following processes that is not involved in project


scope management?

a.

Resource estimation

b.

Expert judgment

c.

Product analysis

d.

Facilitated workshops

Feedback

The correct answer is: Resource estimation

Question 96
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of a function in programming?

a.

To declare variables

b.

To perform arithmetic operations

c.

To define the program's structure

d.

To encapsulate a set of instructions for reuse

Feedback
The correct answer is: To encapsulate a set of instructions for reuse

Question 97

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following layers is an addition to OSI model when


compared with TCP IP model?

a.

Application layer

b.

Netwrok layer

c.

Transportlayer
d.

Session and Presentation layer

Feedback

The correct answer is: Session and Presentation layer

Question 98

Complete

Mark 0.00 out of 1.00

Flag question

Question text

Objects that contain the same types of values and the same
methods are grouped into _________.

a.

One tuples from one relation

b.

Zero tuples and empty relation


c.

Zero tuples from two relation

d.

Two tuples from empty relation

Feedback

The correct answer is: Zero tuples and empty relation

Question 99

Complete

Mark 0.00 out of 1.00

Flag question

Question text

____________ is the total direct and indirect costs incurred in


accomplishing work on an activity during a given period.

a.

The actual cost


b.

The earned value

c.

Planned value

d.

All of the above

Feedback

The correct answer is: The actual cost

Question 100

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is the primary purpose of a computer power supply?


a.

To convert AC to DC

b.

To provide storage for the computer

c.

To cool the internal components

d.

To manage the computer's input/output

Feedback

The correct answer is: To convert AC to DC

Question 101

Complete

Mark 1.00 out of 1.00


Flag question

Question text

The functionalities of the presentation layer include ____________

a.

Data compression

b.

Data encryption

c.

Data description

d.

All of the mentioned

Feedback

The correct answer is: All of the mentioned

Question 102
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following allows you to connect and login to a


remote computer?

a.

SMTP

b.

HTTP

c.

FTP

d.

Telnet
Feedback

The correct answer is: Telnet

Question 103

Complete

Mark 1.00 out of 1.00

Flag question

Question text

To create a dynamic and interactive web page, which technology


would you most likely use in conjunction with HTML and CSS?

a.

Java

b.

JavaScript

c.

SQL
d.

XML

Feedback

The correct answer is: JavaScript

Question 104

Complete

Mark 0.00 out of 1.00

Flag question

Question text

When collection of various computers seems a single coherent


system to its client, then it is called _________

a.

computer network

b.

distributed system
c.

networking system

d.

mail system

Feedback

The correct answer is: computer network

Question 105

Complete

Mark 1.00 out of 1.00

Flag question

Question text

The address that used by applications and hosts to send


information to all nodes on a network is called?

a.

Network Address
b.

IP Address

c.

Broadcast Address

d.

Host Address

Feedback

The correct answer is: Broadcast Address

Question 106

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Among the onStartCommand() method return options in Services,


which one will restart your activity component even if it is killed?
a.

START_REDELIVER_INTENT

b.

START_NOT_STICKY

c.

START_STICKY

d.

All

Feedback

The correct answer is: START_STICKY

Question 107

Complete

Mark 1.00 out of 1.00


Flag question

Question text

In android studio file structure, the file which is used to register


minSdk, targetSdk and app dependencies is

a.

Settings.gradle

b.

Build.gradle

c.

Strings

d.

Android manifest

Feedback

The correct answer is: Build.gradle

Question 108
Complete

Mark 0.00 out of 1.00

Flag question

Question text

In which database languages we used, the commands grant and


revoke privileges to access the database?

a.

Data Manipulation Language

b.

Data Control Language

c.

View Definition Language

d.

Data Definition Languages


Feedback

The correct answer is: Data Control Language

Question 109

Complete

Mark 1.00 out of 1.00

Flag question

Question text

___________________ is a relationship between two things in which


change in one element also affects the other one.

a.

Realization

b.

Generalization

c.

Association
d.

Dependency

Feedback

The correct answer is: Dependency

Question 110

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is considered an administrative security


measure?

a.

Implementing network firewalls

b.

Deploying antivirus software


c.

Conducting regular security awareness training

d.

Configuring intrusion detection systems

Feedback

The correct answer is: Conducting regular security awareness


training

Question 111

Complete

Mark 1.00 out of 1.00

Flag question

Question text

What are identifiers in C++?

a.

Words used to identify elements in a C++ program


b.

Words used to define variables and constants

c.

Reserved words with predefined meanings in C++

d.

User-defined words used for program documentation

Feedback

The correct answer is: Words used to identify elements in a C++


program

Question 112

Complete

Mark 0.00 out of 1.00

Flag question

Question text
Which concept allows you to store the memory address of a
variable in C++?

a.

Arrays

b.

Pointers

c.

Strings

d.

Structures

Feedback

The correct answer is: Pointers

Question 113

Complete

Mark 1.00 out of 1.00


Flag question

Question text

Considering the functional dependency, the one in which removal


from some attributes must affect dependency is called

a.

Partial Functinal Dependency

b.

Transitive Functinal Dependency

c.

Full Functinal Dependency

d.

All

Feedback

The correct answer is: All

Question 114
Complete

Mark 0.00 out of 1.00

Flag question

Question text

________________________show the data entities your application will


support, the data attributes of those entities, the relationships
between the entities, and the candidate keys of the entities.

a.

Logical persistence models

b.

Physical persistence model

c.

User interface modeling

d.

None
Feedback

The correct answer is: Logical persistence models

Question 115

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Design, development, and maintenance of applications for mobile


devices is referred as

a.

developing mobile apps

b.

software engineering

c.

mobile computing
d.

mobile software engineering

Feedback

The correct answer is: mobile software engineering

Question 116

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which operator is used to compare two values for equality in C++?

a.

b.

==
c.

+=

d.

/=

Feedback

The correct answer is: ==

Question 117

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Communication channel is shared by all the machines on the


network in ________

a.

broadcast network
b.

unicast network

c.

multicast network

d.

anycast network

Feedback

The correct answer is: broadcast network

Question 118

Complete

Mark 1.00 out of 1.00

Flag question

Question text

Media recovery deals with _____


a.

Disk errors

b.

Hard errors

c.

System errors

d.

Power failures

Feedback

The correct answer is: Disk errors

Question 119

Complete

Mark 0.00 out of 1.00


Flag question

Question text

One of the following refers error occur when your code doesn't
quite behave the way you thought it would?

a.

Design-time

b.

Runtime

c.

Logic errors

d.

Exception

Feedback

The correct answer is: Logic errors

Question 120
Complete

Mark 1.00 out of 1.00

Flag question

Question text

a.

Association

b.

Aggregation

c.

Collaboration

d.

Abstraction

Feedback

The correct answer is: Aggregation


Question 121

Complete

Mark 0.00 out of 1.00

Flag question

Question text

In PHP, which function is used to include the content of one PHP


file into another PHP file?

a.

include()

b.

require()

c.

import()

d.
Both include() and import()

Feedback

The correct answer is: Both include() and import()

Question 122

Complete

Mark 1.00 out of 1.00

Flag question

Question text

A transaction is required to update a number of fields in a


particular record in a given database table. There should not be
any dirty reads occurring while this transaction is in progress. What
is the correct type of database lock to use in this situation?

a.

Exclusive write lock

b.

Exclusive read lock


c.

Shared read lock

d.

Shared write lock

Feedback

The correct answer is: Exclusive write lock

Question 123

Complete

Mark 0.00 out of 1.00

Flag question

Question text

The data portion of an intent is expressed in the form of

a.

Verb
b.

Variable

c.

URI

d.

None

Feedback

The correct answer is: URI

Question 124

Complete

Mark 1.00 out of 1.00

Flag question

Question text

If the method is not static; how to invoke in the java programming


language?
a.

Methodname()

b.

Classname.methodname()

c.

Objectname.methodname()

d.

Variablename.methodname

Feedback

The correct answer is: Objectname.methodname()

Question 125

Complete

Mark 1.00 out of 1.00


Flag question

Question text

In which approach or technique UNDO will never be needed?

a.

Force approach

b.

Steal approach

c.

Immediate Update Technique

d.

No-Steal approach

Feedback

The correct answer is: No-Steal approach

Question 126
Complete

Mark 1.00 out of 1.00

Flag question

Question text

_________is one of the basic principles of object oriented


programming that use one object in multiple forms.

a.

Inheritance

b.

Interface

c.

Encapsulation

d.

None of the above


Feedback

The correct answer is: None of the above

Question 127

Complete

Mark 1.00 out of 1.00

Flag question

Question text

How do you select an element with the id "header" in CSS?

a.

.header

b.

#header

c.

header
d.

*header

Feedback

The correct answer is: #header

Question 128

Complete

Mark 0.00 out of 1.00

Flag question

Question text

What does the 1st two parameters represent in:


smsManager.sendTextMessage(param1, param2, param3, null,
null);?

a.

phone number and message center

b.
phone number and message text

c.

message text and phone number

d.

message text and message center

Feedback

The correct answer is: phone number and message center

Question 129

Complete

Mark 0.00 out of 1.00

Flag question

Question text

What connector can have audio and video pass through it?

a.
VGA

b.

DVI

c.

RGB

d.

HDMI

Feedback

The correct answer is: HDMI

Question 130

Complete

Mark 1.00 out of 1.00

Flag question

Question text
The purpose of implementing defense-in-depth in an information
system is to_____

a.

Improve system performance

b.

Reduce IT support costs

c.

Provide multiple layers of security controls

d.

Ensure regulatory compliance

Feedback

The correct answer is: Provide multiple layers of security controls

You might also like